National Library of Energy BETA

Sample records for unspecified flaw lets

  1. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  2. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  3. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  4. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  5. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July...

  6. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  7. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  8. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  9. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  10. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  11. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  12. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  13. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  14. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  15. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  16. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  17. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  18. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  19. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  20. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  1. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May ...

  2. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis...

  3. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  4. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  5. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions ... U-033: Microsoft Security Bulletin Summary for November 2011 T-706: Microsoft Fraudulent ...

  6. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  7. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  8. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  9. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  10. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  11. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  12. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  13. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  14. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  15. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  16. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute ... The vendor has issued a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer ...

  17. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  18. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions

    Broader source: Energy.gov [DOE]

    Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions.

  19. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be exploited to...

  20. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation ... Apple Support Addthis Related Articles T-727:Microsoft Windows SSLTLS Protocol Flaw ...

  1. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  2. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  3. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

  4. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  5. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  6. V-227: VMware Workstation and Player vmware-mount Command Flaw...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root...

  7. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  8. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code ... Lets Local Users Gain Elevated Privileges T-536: Cisco ASA Multiple Flaws Let Remote ...

  9. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  10. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact

    Broader source: Energy.gov [DOE]

    A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service.

  11. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  12. V-139: Cisco Network Admission Control Input Validation Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A...

  13. Flawed reasoning

    SciTech Connect (OSTI)

    Frankena, M.W.; Owen, B.M.

    1993-07-15

    The FERC's failure to investigate the Entergy/GSU merger's effects on market power may force other agencies to examine electric utility mergers on their own. The competitive effects of the proposed merger Entergy and Gulf States Utilities (GSU) will not be further investigated by the Federal Energy Regulatory Commission (FERC), according to a January 1993 order. The FERC's primary justification is that the [open quotes]open access[close quotes] transmission conditions offered by the merging parties eliminated concern over market power in transmission and bulk power. The FERC's reasoning is flawed. If the merger were to lead to an increase in market power, the proposed transmission conditions would not prevent the merged firm from exercising that power. The FERC also justifies its decision not to investigate the competitive effects of the merger on the grounds that no intervenor had demonstrated that present competition between the two systems is more than de minimis. This is not an appropriate standard. Intervenors demonstrated that Entergy's and GSU's transmission system offer alternative contract routes for bulk power between generators and customers. Even if Entergy and GSU both do not actually sell significant amounts of the same transmission-service, an antitrust evaluation should consider whether the availability of a second, independent route constrains the pricing of the first. The FERC's reasoning indicates that it has lost its way in carrying out its responsibilities to protect consumers. Open access to transmission systems may play an important role in increasing competition in bulk power markets. However, the FERC's goal should be to promote competition, not merely to open access for its own sake. In its enthusiasm to secure [open quotes]open access[close quotes], the FERC appears willing to ignore possible reductions in competition.

  14. Flaw detection and evaluation

    DOE Patents [OSTI]

    Wilks, Robert S.; Sturges, Jr., Robert H.

    1983-01-01

    The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

  15. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  16. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  17. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  18. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  19. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  20. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  1. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 38: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x

  2. The HMDS Coating Flaw Removal Tool

    SciTech Connect (OSTI)

    Monticelli, M V; Nostrand, M C; Mehta, N; Kegelmeyer, L; Johnson, M A; Fair, J; Widmayer, C

    2008-10-24

    In many high energy laser systems, optics with HMDS sol gel antireflective coatings are placed in close proximity to each other making them particularly susceptible to certain types of strong optical interactions. During the coating process, halo shaped coating flaws develop around surface digs and particles. Depending on the shape and size of the flaw, the extent of laser light intensity modulation and consequent probability of damaging downstream optics may increase significantly. To prevent these defects from causing damage, a coating flaw removal tool was developed that deploys a spot of decane with a syringe and dissolves away the coating flaw. The residual liquid is evacuated leaving an uncoated circular spot approximately 1mm in diameter. The resulting uncoated region causes little light intensity modulation and thus has a low probability of causing damage in optics downstream from the mitigated flaw site.

  3. U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

  4. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting...

  5. ULTRASONIC FLAW DETECTION METHOD AND MEANS

    DOE Patents [OSTI]

    Worlton, D.C.

    1961-08-15

    A method of detecting subsurface flaws in an object using ultrasonic waves is described. An ultnasonic wave of predetermined velocity and frequency is transmitted to engage the surface of the object at a predetermined angle of inci dence thereto. The incident angle of the wave to the surface is determined with respect to phase velocity, incident wave velocity, incident wave frequency, and the estimated depth of the flaw so that Lamb waves of a particular type and mode are induced only in the portion of the object between the flaw and the surface. These Lamb waves are then detected as they leave the object at an angle of exit equal to the angle of incidence. No waves wlll be generated in the object and hence received if no flaw exists beneath the surface. (AEC)

  6. Flaw Tolerance for Multiple Fatique Cracks

    SciTech Connect (OSTI)

    Gosselin, Stephen R.; Simonen, Fredric A.; Carter, R. G.

    2005-07-01

    This paper documents important details of the technical bases for changes to Appendix L. Calculations identified aspect ratios for equivalent single cracks (ESC) between the extremes of a 6:1 ratio and a full circumferential crack that can be used in Appendix L flaw tolerance assessments to account for the initiation, growth, and linking of multiple fatigue cracks. Probabilistic fracture mechanics (PFM) calculations determined ESC aspect ratios that result in the same through-wall crack probability as multiple small cracks (0.02 inch depth) that initiate and coalesce. The computations considered two materials (stainless and low alloy steels), three pipe diameters, five cyclic membrane-to-gradient stress ratios and a wide range of primary loads. Subsequent deterministic calculations identified the ESC aspect ratio for the hypothetical reference flaw depth assumptions in Appendix L. This paper also describes computations that compare the Appendix L flaw tolerance allowable operating period for the ESC models with results obtained when the a single default 6:1 aspect ratio reference flaw.

  7. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  10. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  11. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  13. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  14. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  15. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  16. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  17. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  18. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  19. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Platform Major Release First Fixed Release Nexus 1000v Series Switches 4.x (earlier than 4.2.x) Vulnerable; migrate to 4.2.x 4.2.x 4.2(1)SV1(5.1) Nexus 5000 Series Switches 4.x ...

  20. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  1. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  2. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  3. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  4. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10,...

  5. Procedure for flaw detection in cast stainless steel

    DOE Patents [OSTI]

    Kupperman, David S.

    1988-01-01

    A method of ultrasonic flaw detection in cast stainless steel components incorporating the steps of determining the nature of the microstructure of the cast stainless steel at the site of the flaw detection measurements by ultrasonic elements independent of the component thickness at the site; choosing from a plurality of flaw detection techniques, one such technique appropriate to the nature of the microstructure as determined and detecting flaws by use of the chosen technique.

  6. U-001:Symantec IM Manager Input Validation Flaws

    Broader source: Energy.gov [DOE]

    Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks.

  7. Sandia Wind-Turbine Blade Flaw Detection Experiments in Denmark

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind-Turbine Blade Flaw Detection Experiments in Denmark - Sandia Energy Energy Search ... Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power ...

  8. Ultrasonic Flaw Detection of Cracks and Machined Flaws as Observed Through Austenitic Stainless Steel Piping Welds

    SciTech Connect (OSTI)

    Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Cumblidge, Stephen E.; Diaz, Aaron A.

    2009-07-01

    Piping welds in the pressure boundary of light water reactors (LWRs) are subject to a volumetric examination based on Section XI of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code. Due to access limitations and high background radiation levels, the technique used is primarily ultrasonic rather than radiographic. Many of the austenitic welds in safety-related piping systems provide limited access to both sides of the weld, so a far-side examination is necessary. Historically, far-side inspections have performed poorly because of the coarse and elongated grains that make up the microstructures of austenitic weldments. The large grains cause the ultrasound to be scattered, attenuated, and redirected. Additionally, grain boundaries or weld geometry may reflect coherent ultrasonic echoes, making flaw detection and discrimination a more challenging endeavor. Previous studies conducted at the Pacific Northwest National Laboratory (PNNL) on ultrasonic far-side examinations in austenitic piping welds involved the application of conventional transducers, use of low-frequency Synthetic Aperture Focusing Techniques (SAFT), and ultrasonic phased-array (PA) methods on specimens containing implanted thermal fatigue cracks and machined reflectors [1-2]. From these studies, PA inspection provided the best results, detecting nearly all of the flaws from the far side. These results were presented at the Fifth International Conference on NDE in Relation to Structural Integrity for Nuclear and Pressurised Components in 2006. This led to an invitation to examine field-removed specimens containing service-induced intergranular stress corrosion cracks (IGSCC) at the Electric Power Research Institute’s (EPRI) Nondestructive Evaluation (NDE) Center, in Charlotte, North Carolina. Results from this activity are presented.

  9. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  10. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  11. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  12. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  13. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  14. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  15. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  16. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  17. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  18. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  19. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  20. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  1. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  2. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  3. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login ... and Local Users Gain Elevated Privileges V-076: Cisco Wireless LAN Controller Bugs Let ...

  4. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

  5. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

  6. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial...

  7. Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds

    SciTech Connect (OSTI)

    GJ Schuster, FA Simonen, SR Doctor

    2008-04-01

    The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

  8. NON-DESTRUCTIVE METHOD AND MEANS FOR FLAW DETECTION

    DOE Patents [OSTI]

    Hochschild, R.

    1959-03-10

    BS>An improved method is presented for the nondestructive detection of flaws in olectrictilly conductivc articles using magnetic field. According to thc method a homogoneous mignetic field is established in the test article;it right angle" to the artyicle. A probe is aligned with its axis transverse to the translates so hat th4 probe scans the surface of the test article while the axis of the robe is transverse to the direction of translation of the article. In this manner any output current obtained in thc probe is an indication of the size and location of a flaw in the article under test, with a miiiimum of signal pick- up in the probe from the established magnetic field.

  9. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  10. Defining a Possible Low LET Bystander Effect

    SciTech Connect (OSTI)

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  11. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, J.P.

    1987-06-23

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner. 9 figs.

  12. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, John P.

    1987-06-23

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner.

  13. Method for fabricating prescribed flaws in the interior of metals

    DOE Patents [OSTI]

    Hsu, David K.; Thompson, Donald O.

    1989-03-07

    The method for fabricating a metal body having a flaw of predetermined size and shape located therein comprises placing half of the metal powder required to make the metal body in the die of a press and pressing it to create a flat upper surface thereon. A piece of copper foil is cut to the size and shape of the desired interior crack and placed on the upper surface of the powder and centered in position. The remaining powder is then placed in the die to cover the copper foil. The powder is first cold pressed and removed from the press. The powder metal piece is then sintered in a furnace at a temperature above the melting point of the copper and below the melting point of the metal. It is then removed from the furnace, cooled to room temperature, and placed back in the die and pressed further. This procedure results in an interior flaw or crack. Modified forms of the method involve using a press-sinter-press-sinter cycle with the first sinter being below the melting point of the copper and the second sinter being above the melting point of the copper and below the melting point of the metal.

  14. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  15. Fabrication Flaw Density and Distribution in the Repairs of Reactor Pressure Vessels

    SciTech Connect (OSTI)

    Schuster, George J.; Doctor, Steven R.; Simonen, Fredric A.

    2006-02-15

    The Pacific Northwest National Laboratory (PNNL) is developing a generalized flaw size and density distribution for the population of U.S. reactor pressure vessels (RPVs). The purpose of the generalized flaw distribution is to predict vessel specific flaw rates for use in probabilistic fracture mechanics calculations that estimate vessel failure probability. Considerable progress has been made on the construction of an engineering data base of fabrication flaws in U.S. nuclear RPVs. The fabrication processes and product forms used to construct U.S. RPVs are represented in the data base. A validation methodology has been developed for characterizing the flaws for size, shape, orientation, and composition. The relevance of construction records has been established for describing fabrication processes and product forms. The fabrication flaws were detected in material removed from cancelled nuclear power plants using high sensitivity nondestructive ultrasonic testing, and validated by other nondestructive evaluation (NDE) techniques, and complemented by destructive testing. This paper describes research that has generated data on welding flaws, which indicated that the largest flaws occur in weld repairs. Recent research results confirm that repair flaws are complex in composition and may include cracks on the repair ends. Section III of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code for nuclear power plant components requires radiographic examinations (RT) of welds and requires repairs for RT indications that exceed code acceptable sizes. PNNL has previously obtained the complete construction records for two RPVs. Analysis of these records show a significant change in repair frequency.

  16. Unspecified technologies | Open Energy Information

    Open Energy Info (EERE)

    Solar Thermal Process Heat Solar Water Heat Energy Storage Wind Yes Public Sector Energy Efficiency Aggregation Program State Grant Program Illinois Fed. Government Institutional...

  17. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Workforce ...neighborhoods 2 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big ...

  18. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  19. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of ...

  20. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  1. T-602: BlackBerry Enterprise Server Input Validation Flaw in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

  2. Intense X-rays expose tiny flaws in 3-D printed titanium that...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intense X-rays expose tiny flaws in 3-D printed titanium that can lead to breakage over time By Katie Elyce Jones * March 4, 2016 Tweet EmailPrint Titanium is strong but light - a ...

  3. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities...

  4. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August ... Addthis Related Articles V-211: IBM iNotes Multiple Vulnerabilities U-198: IBM Lotus ...

  5. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS ...

  6. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  7. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  8. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  9. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  10. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  11. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  12. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  13. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  14. Development of flaw acceptance criteria for aging management of spent nuclear fuel multiple-purpose canisters

    SciTech Connect (OSTI)

    Lam, P.; Sindelar, R.

    2015-03-09

    A typical multipurpose canister (MPC) is made of austenitic stainless steel and is loaded with spent nuclear fuel assemblies. The canister may be subject to service-induced degradation when it is exposed to aggressive atmospheric environments during a possibly long-term storage period if the permanent repository is yet to be identified and readied. Because heat treatment for stress relief is not required for the construction of an MPC, stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic In-service Inspection. The first-order instability flaw sizes has been determined with bounding flaw configurations, that is, through-wall axial or circumferential cracks, and part-through-wall long axial flaw or 360° circumferential crack. The procedure recommended by the American Petroleum Institute (API) 579 Fitness-for-Service code (Second Edition) is used to estimate the instability crack length or depth by implementing the failure assessment diagram (FAD) methodology. The welding residual stresses are mostly unknown and are therefore estimated with the API 579 procedure. It is demonstrated in this paper that the residual stress has significant impact on the instability length or depth of the crack. The findings will limit the applicability of the flaw tolerance obtained from limit load approach where residual stress is ignored and only ligament yielding is considered.

  15. Development of flaw acceptance criteria for aging management of spent nuclear fuel multi-purpose canisters

    SciTech Connect (OSTI)

    Lam, Poh -Sang; Sindelar, Robert L.

    2015-03-09

    A typical multipurpose canister (MPC) is made of austenitic stainless steel and is loaded with spent nuclear fuel assemblies. The canister may be subject to service-induced degradation when it is exposed to aggressive atmospheric environments during a possibly long-term storage period if the permanent repository is yet to be identified and readied. Because heat treatment for stress relief is not required for the construction of an MPC, stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic in-service Inspection. The first-order instability flaw sizes has been determined with bounding flaw configurations, that is, through-wall axial or circumferential cracks, and part-through-wall long axial flaw or 360° circumferential crack. The procedure recommended by the American Petroleum Institute (API) 579 Fitness-for-Service code (Second Edition) is used to estimate the instability crack length or depth by implementing the failure assessment diagram (FAD) methodology. The welding residual stresses are mostly unknown and are therefore estimated with the API 579 procedure. It is demonstrated in this paper that the residual stress has significant impact on the instability length or depth of the crack. The findings will limit the applicability of the flaw tolerance obtained from limit load approach where residual stress is ignored and only ligament yielding is considered.

  16. Solar Decathlon 2013: Let the Building Begin | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Begin Solar Decathlon 2013: Let the Building Begin Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village ...

  17. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attacks | Department of Energy 9: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740

  18. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  19. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  20. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  1. Anisotropic determination and correction for ultrasonic flaw detection by spectral analysis

    DOE Patents [OSTI]

    Adler, Laszlo; Von Cook, K.; Simpson, Jr., William A.; Lewis, D. Kent

    1978-01-01

    The anisotropic nature of a material is determined by measuring the velocity of an ultrasonic longitudinal wave and a pair of perpendicular ultrasonic shear waves through a sample of the material each at a plurality of different angles in three planes orthogonal to each other. The determined anisotropic nature is used as a correction factor in a spectral analyzing system of flaw determination.

  2. Apparatus and method for detecting and/or measuring flaws in conductive material

    DOE Patents [OSTI]

    Hockey, Ronald L.; Riechers, Douglas M.

    2000-01-01

    The present invention uses a magnet and sensor coil unilaterial and in relative motion to a conductive material, to measure perturbation or variation in the magnetic field in the presence of a flaw. A liftoff compensator measures a distance between the conductive material and the magnet.

  3. Flaw Stability Considering Residual Stress for Aging Management of Spent Nuclear Fuel Multiple-Purpose Canisters

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lam, Poh-Sang; Sindelar, Robert L.

    2016-04-28

    A typical multipurpose canister (MPC) is made of austenitic stainless steel and is loaded with spent nuclear fuel assemblies. Because heat treatment for stress relief is not required for the construction of the MPC, the canister is susceptible to stress corrosion cracking in the weld or heat affected zone regions under long-term storage conditions. Logic for flaw acceptance is developed should crack-like flaws be detected by Inservice Inspection. The procedure recommended by API 579-1/ASME FFS-1, Fitness-for-Service, is used to calculate the instability crack length or depth by failure assessment diagram. It is demonstrated that the welding residual stress has amore » strong influence on the results.« less

  4. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  5. Improved multi-directional eddy current inspection test apparatus for detecting flaws in metal articles

    DOE Patents [OSTI]

    Nance, Roy A.; Hartley, William H.; Caffarel, Alfred J.

    1984-01-01

    Apparatus is described for detecting flaws in a tubular workpiece in a single scan. The coils of a dual coil bobbin eddy current inspection probe are wound at a 45.degree. angle to the transverse axis of the probe, one coil having an angular position about the axis about 90.degree. relative to the angular position of the other coil, and the angle of intersection of the planes containing the coils being about 60.degree..

  6. Thermal wave image processing for characterization of subsurface of flaws in materials

    SciTech Connect (OSTI)

    Gopalan, K.; Gopalsami, N.

    1993-08-01

    Infrared images resulting from back-scattered thermal waves in composite materials are corrupted by instrument noise and sample heat-spread function. This paper demonstrates that homomorphic deconvolution and {open_quotes}demultiplication{close_quotes} result in enhanced image quality for characterization of subsurface flaws in Kevlar and graphics composites. The choice of processing depends on the material characteristics and the extent of noise in the original image.

  7. Intense X-rays expose tiny flaws in 3-D printed titanium that can lead to

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    breakage over time | Argonne National Laboratory Intense X-rays expose tiny flaws in 3-D printed titanium that can lead to breakage over time By Katie Elyce Jones * March 4, 2016 Tweet EmailPrint Titanium is strong but light - a desirable property among metals. In the twentieth century, titanium was used in military aircraft and equipment and commercial jets. Today, we find this tough and flexible metal all around us - in sports gear, tools, surgical and dental implants, prosthetics,

  8. Stress-intensity-factor influence coefficients for semielliptical inner-surface flaws in clad pressure vessels

    SciTech Connect (OSTI)

    Keeney, J.A.; Bryson, J.W.

    1995-12-31

    A problem of particular interest in pressure vessel technology is the calculation of accurate stress-intensity factors for semielliptical surface cracks in cylinders. Computing costs for direct solution techniques can be prohibitive when applied to three-dimensional (3-D) geometries with time-varying boundary conditions such as those associated with pressurized thermal shock. An alternative superposition technique requires the calculation of a set of influence coefficients for a given 3-D crack model that can be superimposed to obtain mode-I stress-intensity factors. This paper presents stress-intensity-factor influence coefficients (SIFICs) for axially and circumferentially oriented finite-length semielliptical inner-surface flaws with aspect ratios (total crack length (2c) to crack depth (a)) of 2, 6, and 10 for clad cylinders having an internal radius to wall thickness (t) ratio of 10. SIFICs are computed for flaw depths in the range of 0.01 {le} a/t {le} 0.5 and two cladding thicknesses. The incorporate of this SIFIC data base in fracture mechanics codes will facilitate the generation of fracture mechanics solutions for a wide range of flaw geometries as may be required in structural integrity assessments of pressurized-water and boiling-water reactors.

  9. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  10. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  11. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  12. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

  13. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  14. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  15. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  16. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  17. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  18. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target...

  19. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs...

  20. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  1. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  2. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  3. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April...

  4. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  5. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service ...

  6. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  7. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  8. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  9. Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

    2012-06-01

    During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

  10. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  11. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  12. Effect of stainless steel weld overlay cladding on the structural integrity of flawed steel plates in bending. Series 1

    SciTech Connect (OSTI)

    Corwin, W.R.; Robinson, G.C.; Nanstad, R.K.; Merkle, J.G.; Berggren, R.G.; Goodwin, G.M.; Swain, R.L.; Owings, T.D.

    1985-04-01

    The Heavy-Section Steel Technology (HSST) Stainless Steel Cladding Evaluations were undertaken to study the interaction of stainless steel cladding on the inside surface of a reactor pressure vessel with flaws initiating and propagating in base metal. With the more recent focus of safety studies on overcooling type transients, for which the behavior of small flaws is important, stainless steel cladding may have a key role in controlling the propagation and/or arrest of propagating flaws. A complicating factor in understanding the role of stainless steel cladding in this setting is the scarcity of data on its fracture toughness as a function of radiation dose and the fabrication process. The initial phase of the HSST evaluations addresses this question by testing the response of 51-mm-thick flawed plates clad with single-wire, submerged-arc weld overlays of different toughness levels. The tests completed indicate that cladding of moderate toughness had a limited ability to enhance the structural arrest toughness of a beam in bending. The specimen design and fabrication techniques employed for this first completed series of tests resulted in flaw and specimen configurations that prevented adequate control of the stress state at pop-in of the hydrogen-charged electron-beam welds. As a result, analyses of the tests by two approximate techniques and by the ORMGEN-ADINA-ORVIRT finite-element programs were not completely consistent.

  13. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  14. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  15. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Gain Elevated Privileges | Department of Energy 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities

  16. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  17. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards

    Broader source: Energy.gov [DOE]

    Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards, as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website.

  18. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  19. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote ... Vendor fixes are available at Cisco Support Addthis Related Articles V-048: Cisco Wireless ...

  20. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  1. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  2. Non-destructive evaluation means and method of flaw reconstruction utilizing an ultrasonic multi-viewing transducer data acquistion system

    DOE Patents [OSTI]

    Thompson, Donald O.; Wormley, Samuel J.

    1989-03-28

    A multi-viewing ultrasound transducer acquisition system for non-destructive evaluation, flaw detection and flaw reconstruction in materials. A multiple transducer assembly includes a central transducer surrounded by a plurality of perimeter transducers, each perimeter transducer having an axis of transmission which can be angularly oriented with respect to the axis of transmission of the central transducer to intersect the axis of transmission of the central transducer. A control apparatus automatically and remotely positions the transducer assembly with respect to the material by a positioning apparatus and adjusts the pe GRANT REFERENCE This invention was conceived and reduced to practice at least in part under a grant from the Department of Energy under Contract No. W-7407-ENG-82.

  3. Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high-strength steel cylinder

    SciTech Connect (OSTI)

    Rana, M.D.; Smith, J.H.; Tribolet, R.O.

    1997-11-01

    High-pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high-pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3 to 10 mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6 (o.d. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) x Design Pressure.

  4. Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high strength steel cylinder

    SciTech Connect (OSTI)

    Rana, M.D.; Smith, J.H.; Tribolet, R.O.

    1996-12-01

    High pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-Notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3mm to 10mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6(O.D. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) {times} Design Pressure.

  5. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  6. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  7. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Address Bar URLs | Department of Energy 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in

  8. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  9. MicroRNAs let-7b/i suppress human glioma cell invasion and migration by targeting IKBKE directly

    SciTech Connect (OSTI)

    Tian, Yuan; Hao, Shaobo; Ye, Minhua; Zhang, Anling; Nan, Yang; Wang, Guangxiu; Jia, Zhifan; Yu, Kai; Guo, Lianmei; Pu, Peiyu; Huang, Qiang; Zhong, Yue

    2015-03-06

    We demonstrated that IKBKE is overexpressed in human gliomas and that the downregulation of IKBKE markedly inhibits the proliferative and invasive abilities of glioma cells, which is consistent with the results reported by several different research groups. Therefore, IKBKE represents a promising therapeutic target for the treatment of glioma. In the present study, we verified that the microRNAs let-7b and let-7i target IKBKE through luciferase assays and found that let-7b/i mimics can knock down IKBKE and upregulate E-cadherin through western blot analysis. Moreover, the expression levels of let-7b/i were significantly lower in glioma cell lines than that in normal brain tissues, as determined by quantitative real-time PCR. Furthermore, let-7b/i inhibit the invasion and migration of glioma cells, as determined through wound healing and Transwell assays. The above-mentioned data suggest that let-7b/i inhibit the invasive ability of glioma cells by directly downregulating IKBKE and indirectly upregulating E-cadherin. - Highlights: • Let-7b and let-7i are downregulated in glioma cell lines. • IKBKE is a target gene of let-7b/i. • Let-7b/i inhibit the invasion and migration of glioma cells. • Let-7b/i upregulate E-cadherin by downregulating IKBKE.

  10. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  11. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  12. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in ...

  13. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  14. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  15. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  16. Electromagnetic methods for measuring materials properties of cylindrical rods and array probes for rapid flaw inspection

    SciTech Connect (OSTI)

    Sun, Haiyan

    2005-05-01

    The case-hardening process modifies the near-surface permeability and conductivity of steel, as can be observed through changes in alternating current potential drop (ACPD) along a rod. In order to evaluate case depth of case hardened steel rods, analytical expressions are derived for the alternating current potential drop on the surface of a homogeneous rod, a two-layered and a three-layered rod. The case-hardened rod is first modeled by a two-layer rod that has a homogeneous substrate with a single, uniformly thick, homogeneous surface layer, in which the conductivity and permeability values differ from those in the substrate. By fitting model results to multi-frequency ACPD experimental data, estimates of conductivity, permeability and case depth are found. Although the estimated case depth by the two-layer model is in reasonable agreement with the effective case depth from the hardness profile, it is consistently higher than the effective case depth. This led to the development of the three-layer model. It is anticipated that the new three-layered model will improve the results and thus makes the ACPD method a novel technique in nondestructive measurement of case depth. Another way to evaluate case depth of a case hardened steel rod is to use induction coils. Integral form solutions for an infinite rod encircled by a coaxial coil are well known, but for a finite length conductor, additional boundary conditions must be satisfied at the ends. In this work, calculations of eddy currents are performed for a two-layer conducting rod of finite length excited by a coaxial circular coil carrying an alternating current. The solution is found using the truncated region eigenfunction expansion (TREE) method. By truncating the solution region to a finite length in the axial direction, the magnetic vector potential can be expressed as a series expansion of orthogonal eigenfunctions instead of as a Fourier integral. Closed-form expressions are derived for the electromagnetic field in the presence of a finite a two-layer rod and a conductive tube. The results are in very good agreement with those obtained by using a 2D finite element code. In the third part, a new probe technology with enhanced flaw detection capability is described. The new probe can reduce inspection time through the use of multiple Hall sensors. A prototype Hall array probe has been built and tested with eight individual Hall sensor ICs and a racetrack coil. Electronic hardware was developed to interface the probes to an oscilloscope or an eddy current instrument. To achieve high spatial resolution and to limit the overall probe size, high-sensitivity Hall sensor arrays were fabricated directly on a wafer using photolithographic techniques and then mounted in their unencapsulated form. The electronic hardware was then updated to interface the new probes to a laptop computer.

  17. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  18. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let's Keep Talking: Women in STEM Tweet Up Let's Keep Talking: Women in STEM Tweet Up April 11, 2012 - 2:37pm Addthis The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department file photo The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department

  19. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  20. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Local Users Gain Elevated Privileges | Department of Energy 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure

  1. Effects of estrogen and gender on cataractogenesis induced by high-LET radiation

    SciTech Connect (OSTI)

    Henderson, M.A.; Rusek, A.; Valluri, S.; Garrett, J.; Lopez, J.; Caperell-Grant, A.; Mendonca, M.; Bigsby, R.; Dynlacht, J.

    2010-02-01

    Planning for long-duration manned lunar and interplanetary missions requires an understanding of radiation-induced cataractogenesis. Previously, it was demonstrated that low-linear energy transfer (LET) irradiation with 10 Gy of {sup 60}Co {gamma} rays resulted in an increased incidence of cataracts in male rats compared to female rats. This gender difference was not due to differences in estrogen, since male rats treated with the major secreted estrogen 17-{beta}-estradiol (E2) showed an identical increase compared to untreated males. We now compare the incidence and rate of progression of cataracts induced by high-LET radiation in male and female Sprague-Dawley rats. Rats received a single dose of 1 Gy of 600 MeV {sup 56}Fe ions. Lens opacification was measured at 2-4 week intervals with a slit lamp. The incidence and rate of progression of radiation-induced cataracts was significantly increased in the animals in which estrogen was available from endogenous or exogenous sources. Male rats with E2 capsules implanted had significantly higher rates of progression compared to male rats with empty capsules implanted (P = 0.025) but not compared to the intact female rats. These results contrast with data obtained after low-LET irradiation and suggest the possibility that the different types of damage caused by high- and low-LET radiation may be influenced differentially by steroid sex hormones.

  2. SU-E-T-555: A Protontherapy Inverse Treatment Planning System Prototype with Linear Energy Transfer (LET) Optimization

    SciTech Connect (OSTI)

    Sanchez-Parcerisa, D; Carabe-Fernandez, A

    2014-06-01

    Purpose: Develop and benchmark an inverse treatment planning system (TPS) for proton radiotherapy integrating fast analytical dose and LET calculations in patient geometries and a dual objective function with both dose and LET components, enabling us to apply optimization techniques to improve the predicted outcome of treatments based on radiobiological models. Methods: The software package was developed in MATLAB and implements a fluence-dose calculation technique based on a pencil beam model for dose calculations and a 3D LET model based on the extension of the LET in the radial direction as a function of the predicted radiological pathway. Both models were benchmarked against commissioning data from our institution, dose calculations performed with a commercial treatment planning system and Monte Carlo simulations. The optimization is based on the adaptive simulated annealing approach . Results: The dose and LET calculations were tested in a water phantom and several real patient treatments. The pass rate for the gamma index analysis (3%/3mm) test was above 90% for all test cases analyzed, and the calculation time was of the order of seconds. The inverse planning module produced plans with a significantly higher mean LET in the target compared to traditional plans, without any loss of target coverage. The clinical relevance of this improvement is under consideration . Conclusion: The developed treatment planning system is a valuable clinical and research tool that enables us to incorporate LET effects into proton radiotherapy planning in a streamlined fashion.

  3. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  4. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  5. Research Highlight: Let the Good Times Flow - Joint Center for Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Storage Research October 1, 2015, News Articles Research Highlight: Let the Good Times Flow There are two electrodes in every battery. One electrode, called the cathode, connects to the positive end of the battery and is where the electric current leaves the battery. The other electrode, the anode, connects to the negative end of the battery and is where the electric current enters the battery. The flow of these electrons through an external circuit is what produces the electric current.

  6. Final Assessment of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Cinson, Anthony D.; Crawford, Susan L.; Prowant, Matthew S.; Doctor, Steven R.

    2014-03-24

    PNNL conducted a technical assessment of the NDE issues and protocols that led to missed detections of several axially oriented flaws in a steam generator primary inlet dissimilar metal weld at North Anna Power Station, Unit 1 (NAPS-1). This particular component design exhibits a significant outside-diameter (OD) taper that is not included as a blind performance demonstration mock-up within the industrys Performance Demonstration Initiative, administered by EPRI. For this reason, the licensee engaged EPRI to assist in the development of a technical justification to support the basis for a site-specific qualification. The service-induced flaws at NAPS-1 were eventually detected as a result of OD surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the dissimilar metal weld. A total of five axially oriented flaws were detected in varied locations around the weld circumference. The field volumetric examination that was conducted at NAPS-1 was a non-encoded, real-time manual ultrasonic examination. PNNL conducted both an initial assessment, and subsequently, a more rigorous technical evaluation (reported here), which has identified an array of NDE issues that may have led to the subject missed detections. These evaluations were performed through technical reviews and discussions with NRC staff, EPRI NDE Center personnel, industry and ISI vendor personnel, and ultrasonic transducer manufacturers, and laboratory tests, to better understand the underlying issues at North Anna.

  7. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, J.K.; Reed, S.T.; Ashley, C.S.; Neiser, R.A.; Moffatt, W.C.

    1999-07-20

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties. 6 figs.

  8. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, Janda K.; Reed, Scott T.; Ashley, Carol S.; Neiser, Richard A.; Moffatt, William C.

    1999-01-01

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties.

  9. A FRAMEWORK TO DEVELOP FLAW ACCEPTANCE CRITERIA FOR STRUCTURAL INTEGRITY ASSESSMENT OF MULTIPURPOSE CANISTERS FOR EXTENDED STORAGE OF USED NUCLEAR FUEL

    SciTech Connect (OSTI)

    Lam, P.; Sindelar, R.; Duncan, A.; Adams, T.

    2014-04-07

    A multipurpose canister (MPC) made of austenitic stainless steel is loaded with used nuclear fuel assemblies and is part of the transfer cask system to move the fuel from the spent fuel pool to prepare for storage, and is part of the storage cask system for on-site dry storage. This weld-sealed canister is also expected to be part of the transportation package following storage. The canister may be subject to service-induced degradation especially if exposed to aggressive environments during possible very long-term storage period if the permanent repository is yet to be identified and readied. Stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone because the construction of MPC does not require heat treatment for stress relief. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic Inservice Inspection. The external loading cases include thermal accident scenarios and cask drop conditions with the contribution from the welding residual stresses. The determination of acceptable flaw size is based on the procedure to evaluate flaw stability provided by American Petroleum Institute (API) 579 Fitness-for-Service (Second Edition). The material mechanical and fracture properties for base and weld metals and the stress analysis results are obtained from the open literature such as NUREG-1864. Subcritical crack growth from stress corrosion cracking (SCC), and its impact on inspection intervals and acceptance criteria, is not addressed.

  10. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  11. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  12. Shallow Flaws Under Biaxial Loading Conditions, Part II: Application of a Weibull Stress Analysis of the Cruciform Bend Specimen Using a Hydrostatic Stress Criterion

    SciTech Connect (OSTI)

    Bass, B.R.; McAfee, W.J.; Williams, P.T.

    1999-08-01

    Cruciform beam fracture mechanics specimensl have been developed in the Heavy Section Steel Technology (HSST) Program at Oak Ridge National Laboratory (ORNL) to introduce a prototypic, far- field, out-of-plane biaxird bending stress component in the test section that approximates the nonlinear biaxial stresses resulting from pressurized-thernxd-shock or pressure-temperature loading of a nuclear reactor pressure vessel (RPV). Matrices of cruciform beam tests were developed to investigate and quantify the effects of temperature, biaxial loading, and specimen size on fracture initiation toughness of two-dimensional (constant depth), shtdlow, surface flaws. Tests were conducted under biaxial load ratios ranging from uniaxial to equibiaxial. These tests demonstrated that biaxial loading can have a pronounced effect on shallow-flaw fracture toughness in the lower transition temperature region for RPV materials. Two and three- parameter Weibull models have been calibrated using a new scheme (developed at the University of Illinois) that maps toughness data from test specimens with distinctly different levels of crack-tip constraint to a small scale yielding (SSY) Weibull stress space. These models, using the new hydrostatic stress criterion in place of the more commonly used maximum principal stress in the kernel of the OW integral definition, have been shown to correlate the experimentally observed biaxiaI effect in cruciform specimens, thereby providing a scaling mechanism between uniaxial and biaxial loading states.

  13. Fatal Flaw Analysis of Utility-Scale Wind Turbine Generators at the West Haymarket Joint Public Agency. A Study Prepared in Partnership with the Environmental Protection Agency for the RE-Powering America's Land Initiative: Siting Renewable Energy on Potentially Contaminated Land and Mine Sites

    SciTech Connect (OSTI)

    Roberts, J. O.; Mosey, G.

    2013-08-01

    Fatal flaw analysis of utility-scale wind turbines at the West Haymarket Joint Public Agency brownfields site in Lincoln, Nebraska, funded by EPA.

  14. SU-E-T-354: Peak Temperature Ratio of TLD Glow Curves to Investigate the Spatial Dependence of LET in a Clinical Proton Beam

    SciTech Connect (OSTI)

    Reft, C [UniversityChicago, Chicago, IL (United States); Pankuch, M; Ramirez, H [ProCure Treatment Centers, Warrenville, IL (United States)

    2014-06-01

    Purpose: Use the ratio of the two high temperature peaks (HTR) in TLD 700 glow curves to investigate spatial dependence of the linear energy transfer (LET) in proton beams. Studies show that the relative biological effectiveness (RBE) depends upon the physical dose as well as its spatial distribution. Although proton therapy uses a spatially invariant RBE of 1.1, studies suggest that the RBE increases in the distal edge of a spread out Bragg peak (SOBP) due to the increased LET. Methods: Glow curve studies in TLD 700 show that the 280 C temperature peak is more sensitive to LET radiation than the 210 C temperature peak. Therefore, the areas under the individual temperature peaks for TLDs irradiated in a proton beam normalized to the peak ratio for 6 MV photons are used to determine the HTR to obtain information on its LET. TLD 700 chips with dimensions 0.310.310.038 cc are irradiated with 90 MeV protons at varying depths in a specially designed blue wax phantom to investigate LET spatial dependence. Results: Five TLDs were placed at five different depths of the percent depth dose curve (PDD) of range 16.2 cm: center of the SOPB and approximately at the 99% distal edge, 90%, 75% and 25% of the PDD, respectively. HTR was 1.3 at the center of the SOBP and varied from 2.2 to 3.9 which can be related to an LET variation from 0.5 to 18 KeV/? via calibration with radiation beams of varying LET. Conclusion: HTR data show a spatially invariant LET slightly greater than the 6 MV radiations in the SOBP, but a rapidly increasing LET at the end of the proton range. These results indicate a spatial variation in RBE with potential treatment consequences when selecting treatment margins to minimize the uncertainties in proton RBE.

  15. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  16. In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

    2012-09-17

    Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), “Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events,” adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, §50.61a, published on January 4, 2010, entitled “Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events” (75 FR 13). Use of the new rule by licensees is optional. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensee’s reactor vessel beltline welds are bounded by the flaw density and size distribution values used in the PTS technical basis. Under a contract with the NRC, Pacific Northwest National Laboratory (PNNL) has been working on a program to assess the ability of current inservice inspection (ISI)-ultrasonic testing (UT) techniques, as qualified through ASME Code, Appendix VIII, Supplements 4 and 6, to detect small fabrication or inservice-induced flaws located in RPV welds and adjacent base materials. As part of this effort, the investigators have pursued an evaluation, based on the available information, of the capability of UT to provide flaw density/distribution inputs for making RPV weld assessments in accordance with §50.61a. This paper presents the results of an evaluation of data from the 1993 Browns Ferry Nuclear Plant, Unit 3, Spirit of Appendix VIII reactor vessel examination, a comparison of the flaw density/distribution from this data with the distribution in §50.61a, possible reasons for differences, and plans and recommendations for further work in this area.

  17. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability...

  18. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  19. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  20. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  1. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  2. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  3. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  4. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  5. Oxidative Stress and Skeletal Health with Low-Dose, Low-LET (Linear Energy Transfer) Ionizing Radiation

    SciTech Connect (OSTI)

    Globus, Ruth K.

    2014-11-03

    We performed in vivo and in vitro experiments to accomplish the following specific aims of this project: 1) determine if low dose, low LET radiation affects skeletal remodeling at structural, cellular and molecular levels and 2) determine if low dose, low LET radiation modulates skeletal health during aging via oxidative mechanisms. A third aim is supported by NASA supplement to this DOE grant focusing on the influence of high LET radiation on bone. A series of experiments were conducted at the NASA Space Radiation Laboratory at Brookhaven, NSRL-BNL, using iron (56Fe) or a sequential exposure to protons / iron / protons, and separate experiments at NASA Ames Research Center (ARC) using 137Cs. The following provides a summary of key findings. (1) Exposure of nine-week old female mice to priming doses of gamma radiation (10cGy x 5) did not significantly affect bone volume/total volume (BV/TV) or microarchitecture as analyzed by 3D microcomputed tomography. As expected, exposure to the challenge dose of 2 Gy gamma irradiation resulted in significant decreases in BV/TV. The priming dose combined with the 2Gy challenge dose had no further effect on BV/TV compared to challenge dose alone, with the sole exception of the Structural Model Index (SMI). SMI reflects the ratio of rods-to-plates in cancellous bone tissue, such that higher SMI values indicate a tendency toward a weaker structure compared to lower SMI values. Mice treated with both priming and challenge dose had 25% higher SMI values compared to sham-irradiated controls and 7% higher values compared to mice treated with the challenge dose alone. Thus, although this priming regimen had relatively modest effects on cancellous tissue, the difference in SMI suggests this fractionated priming doses have adverse, rather than beneficial, effects on bone structure. (2) In 10-week old male mice, a single exposure to 100cGy of 137Cs reduces trabecular bone number and connectivity density by 20% and 36% respectively one month after irradiation (IR). At four months post-IR, these animals were comparable to sham-treated controls with regards to the abovementioned structural parameters. Irradation at 1 or 10 cGy did not result in any significant changes in bone structural parameters. (3) Irradiation of 16-wk old male mice with high doses of 56Fe or proton (50 or 200cGy), but not at low doses (5 or 10cGy), showed a similar loss of cancellous BV/TV and trabecular number at five weeks post-IR. (4) Age-related bone loss overtook acute radiation-induced decrements in bone structure within four months post-IR with 100 cGy gamma and 12 months post-IR with 200 cGy iron. Transgenic mice globally overexpressing human catalase gene in mitochondria did not exhibit cancellous bone loss as assessed at four month post-IR with 10 cGy proton, 50 cGy iron, or in combination. (5) The cellular and molecular mechanisms responsible for loss of bone with radiation are mediated primarily through increased osteoclastogenesis. Our data provide evidence that there are increases in gene expression of TNF alpha and MCP1 in the bone marrow cells 24 hours post-IR and of osteoclastogenic differentiation factor RANKL by day 3. These cytokines in the marrow may stimulate mature osteoclasts or drive osteoclastogenesis from precursors. (6) Osteoblastogenesis from marrow progenitors evaluated ex vivo decreased following whole body 56Fe irradiation at a dose threshold between 20 and 50 cGy whereas osteoclastogenesis ex vivo increased with doses as low as 10cGy two days post-IR of mice. However, the latter finding was not observed in more than a single experiment. (7) Gamma irradiation of cells in vitro requires relatively high doses (200cGy) to disturb normal osteoblastogenesis and osteoclastogenesis as evidenced by decrements in mineralized nodule formation, osteoclast counts, and expression of osteoblast related genes such as runx2, col1a1. (8) We also investigated the effect of antioxidants on osteoblastogenesis following low dose in vitro gamma irradiation (15cGy) on day four bone marrow stromal cell cultures. Superoxide dismutase (SOD) was added to the cell culture medium for 2 or 3 days post-irradiation and cell colonies were counted on days 7 and 10. SOD treatment increased cell growth as measured by DNA content and colony forming units (CFU) in both irradiated cells and 0 cGy control groups. However, low dose radiation of 15cGy abolished SOD stimulatory effects on cell growth and CFU number. These results suggest that exogenous SOD increases osteoblast cell growth and colony formation and that low-dose radiation (15cGy) can interfere with the antioxidant effects. In summary, our findings indicate that acute, whole body irradiation at high doses (50-200 cGy) results in prompt tissue degradation and bone loss. Lower doses (<50 cGy) do not cause bone structural deterioration but may deplete stem/progenitor cell pools in the bone marrow.

  6. Evaluation on the Feasibility of Using Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density/Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.

    2014-06-10

    This technical letter report provides the status of an assessment undertaken by PNNL at the request of the NRC to verify the capability of periodic ASME-required volumetric examinations of reactor vessels to characterize the density and distribution of flaws of interest for applying §50.61a on a plant-by-plant basis. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), "Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events," establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. Recently, the NRC completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed and promulgated an alternate PTS rule, §50.61a, that can be implemented by PWR licensees. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants.

  7. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan; Xu, Nancy R; Mohan, Sumathy

    2013-06-03

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10 cGy on coverslips will be examined for (a) low LET radiation-induced alterations of cellular function and its physiological relevance in real time; and (b) radiation damage triggered bystander effect on the neighboring unirradiated cells. First, to determine the low LET radiation induced alteration of cellular function we will examine: (i) the real time transformation of single membrane transporters in single living cells; (ii) the pump efficiency of membrane efflux pump of live cells in real time at the molecular level; (iii) the kinetics of single-ligand receptor interaction on single live cell surface (Figure C); and (iv) alteration in chromosome replication in living cell. Second, to study the radiation triggered bystander responses, we will examine one of the key signaling pathway i.e. TNF- alpha/NF-kappa B mediated signaling. TNF-alpha specific nano particle sensors (green) will be developed to detect the releasing dynamics, transport mechanisms and ligand-receptor binding on live cell surface in real time. A second sensor (blue) will be developed to simultaneously monitor the track of NF-kB inside the cell. The proposed nano-particle optics approach would complement our DOE funded study on biochemical mechanisms of TNF-alpha- NF-kappa B-mediated bystander effect.

  8. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python...

  9. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain ... AnyConnect VPN Client Two Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws ...

  10. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling...

  11. U-139: IBM Tivoli Directory Server Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input.

  12. Method and apparatus for detecting flaws in conductive material

    DOE Patents [OSTI]

    Hockey, Ronald L.; Riechers, Douglas M.

    1998-01-01

    The present invention uses a magnet in relative motion to a conductive material, and a coil that is stationary with respect to the magnet to measure perturbation or variation in the magnetic field in the presence of an inclusion. The magnet and coil sensor may be on the same side of the conductive material.

  13. U-147:Red Hat Enterprise MRG Grid Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The MRG Management Console (Cumin) does not properly filter HTML code from user-supplied input before displaying the input.

  14. Method and apparatus for detecting flaws in conductive material

    DOE Patents [OSTI]

    Hockey, R.L.; Riechers, D.M.

    1998-07-07

    The present invention uses a magnet in relative motion to a conductive material, and a coil that is stationary with respect to the magnet to measure perturbation or variation in the magnetic field in the presence of an inclusion. The magnet and coil sensor may be on the same side of the conductive material. 18 figs.

  15. High temperature ultrasonic testing of materials for internal flaws

    DOE Patents [OSTI]

    Kupperman, David S.; Linzer, Melvin

    1990-01-01

    An apparatus is disclosed for nondestructive evaluation of defects in hot terials, such as metals and ceramics, by sonic signals, which includes a zirconia buffer in contact with a hot material being tested, a liquid couplant of borax in contact with the zirconia buffer and the hot material to be tested, a transmitter mounted on the zirconia buffer sending sonic signals through the buffer and couplant into the hot material, and a receiver mounted on the zirconia buffer receiving sonic signals reflected from within the hot material through the couplant and the buffer.

  16. Impedance sensing of flaws in non-homogenous materials

    DOE Patents [OSTI]

    Novak, James L.

    1997-01-01

    An apparatus and method for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths.

  17. Impedance sensing of flaws in non-homogeneous materials

    DOE Patents [OSTI]

    Novak, J.L.

    1997-02-11

    An apparatus and method are disclosed for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths. 10 figs.

  18. U-175: Linux Kernel KVM Memory Slot Management Flaw

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

  19. U-245: Critical Java 0-day flaw exploited

    Broader source: Energy.gov [DOE]

    Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines

  20. Solar Decathlon 2015: Let the Competition Begin

    Broader source: Energy.gov [DOE]

    We're officially kicking off Solar Decathlon 2015 with the announcement of 20 new collegiate teams. Find out who will compete!

  1. Solar Decathlon 2013: Let the Building Begin

    Broader source: Energy.gov [DOE]

    Last week, teams began reassembling their houses on the Solar Decathlon competition site. See photo updates from the first week of construction.

  2. Let the private sector handle energy conservation

    SciTech Connect (OSTI)

    Bajer, E.R.

    1982-08-23

    Mr. Bajer feels that elimination of many federal conservation programs will have no effect on the US goal of reducing oil imports because the private sector can do a better job of providing these efforts. He notes that many government programs were the result of overreaction to the 1973 oil embargo, when Congress misread the public's willingness to respond. The American people have taken the initiative, however, and have reduced their energy consumption and import rates. Mr. Bajer further notes that, according to the DOE Office of Policy, Planning and Analysis, DOE's conservation programs accounted for less than 5% of reduction of energy use per unit of GNP. He thinks that new policies will allow market forces to continue providing conservation incentives and will remove government intervention and competition with the private sector. (DCK)

  3. TABLE OF

    Energy Savers [EERE]

    Users Access or Modify SSL/TLS Sessions | Department of Energy 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5

  4. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  5. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  6. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  7. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  8. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Broader source: Energy.gov (indexed) [DOE]

    PDF icon Spotlight on Austin, Texas More Documents & Publications Spotlight on Austin, Texas: Best Offer Ever Produces Upgrades in Record Time Spotlight on Austin, Texas: Best ...

  9. Let's Compare Tritium Design Practices Across The DOE Complex | Department

    Office of Environmental Management (EM)

    Energy Lessons Learned: An Ongoing Dialogue About Smart Grid Lessons Learned: An Ongoing Dialogue About Smart Grid November 21, 2011 - 11:31am Addthis EPB’s $226 million Smart Grid Investment Grant project, part of the Energy Department's Recovery Act funding has allowed upgrades on its distribution system and the installation of “smart” switches and sensor equipment for 164 distribution circuits as well as the deployment of approximately 1500 smart switches system-wide.

  10. Going completely renewable: is it possible (let alone desirable)?

    SciTech Connect (OSTI)

    Sovacool, Benjamin K.; Watts, Charmaine

    2009-05-15

    With the right mix of leadership and policy, a completely renewable electricity sector for New Zealand and the United States is feasible, achievable, and desirable. (author)

  11. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  12. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  13. U-255: Apache Wicket Input Validation Flaw Permits Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in ajax links before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed...

  14. Distant Observer Tool Quickly Identifies Costly Flaws in CSP Fields (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01

    Remote control digital photography and metrology are combined to accurately define optical efficiency problems in concentrating solar power (CSP) plants.

  15. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can conduct cross-frame scripting attacks CVE-2012-2280. Imp act: A remote user can access the target user's cookies (including authentication cookies), if any, ...

  16. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.

  17. Ultrasonic Phased Array Technique for Accurate Flaw Sizing in Dissimilar Metal Welds

    SciTech Connect (OSTI)

    Jonathan D Buttram

    2005-03-11

    Described is a manual,portable non-destructive technique to determine the through wall height of cracks present in dissimilar metal welds used in the primary coolling systems of pressure water and boiler light water reactors. Current manual methods found in industry have proven not to exhibit the sizing accuracy required by ASME inspection requirement. The technique described demonstrated an accuracy approximately three times that required to ASME Section XI, Appendix 8 qualification.

  18. U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

  19. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  20. Validation of analysis methods for assessing flawed piping subjected to dynamic loading

    SciTech Connect (OSTI)

    Olson, R.J.; Wolterman, R.L.; Wilkowski, G.M.; Kot, C.A.

    1994-08-01

    Argonne National Laboratory and Battelle have jointly conducted a research program for the USNRC to evaluate the ability of current engineering analysis methods and one state-of-the-art analysis method to predict the behavior of circumferentially surface-cracked pipe system water-hammer experiment. The experimental data used in the evaluation were from the HDR Test Group E31 series conducted by the Kernforschungszentrum Karlsruhe (KfK) in Germany. The incentive for this evaluation was that simplified engineering methods, as well as newer ``state-of-the-art`` fracture analysis methods, have been typically validated only with static experimental data. Hence, these dynamic experiments were of high interest. High-rate dynamic loading can be classified as either repeating, e.g., seismic, or nonrepeating, e.g., water hammer. Development of experimental data and validation of cracked pipe analyses under seismic loading (repeating dynamic loads) are being pursued separately within the NRC`s International Piping Integrity Research Group (IPIRG) program. This report describes developmental and validation efforts to predict crack stability under water hammer loading, as well as comparisons using currently used analysis procedures. Current fracture analysis methods use the elastic stress analysis loads decoupled from the fracture mechanics analysis, while state-of-the-art methods employ nonlinear cracked-pipe time-history finite element analyses. The results showed that the current decoupled methods were conservative in their predictions, whereas the cracked pipe finite element analyses were more accurate, yet slightly conservative. The nonlinear time-history cracked-pipe finite element analyses conducted in this program were also attractive in that they were done on a small Apollo DN5500 workstation, whereas other cracked-pipe dynamic analyses conducted in Europe on the same experiments required the use of a CRAY2 supercomputer, and were less accurate.

  1. A STRUCTURAL IMPACT ASSESSMENT OF FLAWS DETECTED DURING ULTRASONIC EXAMINATION OF TANK 15

    SciTech Connect (OSTI)

    Wiersma, B; James Elder, J

    2008-08-21

    Ultrasonic (UT) inspection of Tank 15 was conducted between April and July 2007 in accordance with the Tank 15 UT inspection plan. This was a planned re-inspection of this tank, the previous one was performed in 2002. Ten cracks were characterized in the previous examination. The re-inspection was performed to verify the present models and understanding for stress corrosion cracking. During this re-examination, one indication that was initially reported as a 'possible perpendicular crack <25% through wall' in 2002, was clearly shown not to be a crack. Additionally, examination of a new area immediately adjacent to other cracks along a vertical weld revealed three new cracks. It is not known when these new cracks formed as they could very well have been present in 2002 as well. Therefore, a total of twelve cracks were evaluated during the re-examination. A critical review of the information describing stress corrosion crack behavior for the SRS waste tanks, as well as a summary review of the service history of Tank 15, was performed. Each crack was then evaluated for service exposure history, consistency of the crack behavior with the current understanding of stress corrosion cracking, and present and future impact to the structural integrity of the tank. Crack instability calculations were performed on each crack for a bounding waste removal loading condition in Tank 15. In all cases, the crack behavior was determined to be consistent with the previous understanding of stress corrosion cracking in the SRS waste tank environment. The length of the cracks was limited due to the short-range nature of the residual stresses near seam, repair and attachment welds. Of the twelve cracks, nine were located in the vapor space above the sludge layer, including the three new cracks. Comparison of the crack lengths measured in 2002 and 2007 revealed that crack growth had occurred in four of the six previously measured vapor space cracks. However, the growth remained within the residual stress zone. None of the three cracks beneath the sludge showed evidence of growth. The impact of the cracks that grew on the future service of Tank 15 was also assessed. Tank 15 is expected to undergo closure activities including sludge waste removal. A bounding loading condition for waste removal of the sludge at the bottom of Tank 15 was considered for this analysis. The analysis showed that the combination of hydrostatic, seismic, pump and weld residual stresses are not expected to drive any of the cracks identified during the Tank 15 UT inspection to instability. Wall thickness mapping for general thinning and pitting was also performed. No significant wall thinning was observed. The average wall thickness values were well above nominal. Two isolated pit-like indications were observed. Both were approximately 30 mils deep. However, the remaining wall thickness was still greater than nominal specified for the original construction plate material. It was recommended that a third examination of selected cracks in Tank 15 be performed in 2014. This examination would provide information to determine whether any additional detectable degradation is occurring in Tank 15 and to supplement the basis for characterization of conditions that are non-aggressive to tank corrosion damage. The in-service inspection program is re-evaluated on a three year periodicity. The Type I and II tanks are not active receipt tanks at present, and are therefore not a part of the In-Service Inspection Program for the Type III Tanks [1]. Changes to the mission for Tank 15 and other Type I and II tanks may be considered by the In-Service Inspection Review Committee (ISIRC) and the program adjusted accordingly.

  2. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  3. Coiled tubing: Early warning system to detect flaws in flat sheet prior to rolling and welding

    SciTech Connect (OSTI)

    Edens, C.W. )

    1994-05-01

    Through experimentation and dynamic evaluation of skelp at a coiled tubing mill, the use of leakage flux solid state sensing devices shows clearly that the requirement for nondestructively testing skelp can be met. As coiled tubing for drilling purposes gains wider usage, its skelp can take advantage of upstream inspection prior to forming the tubes. A reliable coiled tubing product is one in which every aspect of its manufacturing was considered, from raw material through final inspection. In no other way can the concept of total quality management be satisfied providing reliability of product use. A guarantee of fitness for purpose falls directly on the coiled tubing manufacturer. Purveyors of jointed electronic resistance weld tubulars may also take advantage of this inspection method. The American Petroleum Institute (API) has recently established a committee to study and formulate recommended practices for coiled tubing operations.

  4. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Symantec’s Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages.

  5. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  6. U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

    Broader source: Energy.gov [DOE]

    The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

  7. Geothermal Literature Review | Open Energy Information

    Open Energy Info (EERE)

    Geothermal Literature Review (Smith, 1983) Unspecified A History Of Hot Dry Rock Geothermal Energy Systems Geothermal Literature Review (Wisian, Et Al., 2001) Unspecified...

  8. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  9. Prediction of failure behavior of a welded pressure vessel containing flaws during a hydrogen-charged burst test

    SciTech Connect (OSTI)

    Bhuyan, G.S.; Sperling, E.J.; Shen, G.; Yin, H.; Rana, M.D.

    1996-12-01

    An industry-government collaborative program was carried out with an aim to promoting the acceptance of fracture mechanics based fitness-for-service assessment methodology for a service-damaged pressure vessel. A collaborative round robin exercise was carried out to predict the fracture behavior of a vessel containing hydrogen damage, fabrication related lack-of-fusion defects, an artificially induced fatigue crack and a localized thinned area. The fracture assessment procedures used include the US ASME Material Property Council`s PREFIS Program based on the British Standard (BS) Published Document (PD) 6493, ASME Section XI and The Central Electricity Generating Board (CEGB) R6 approach; The welding Institute (TWI) CRACKWISE program (based on BS PD6493 Level 2 approach), a variant of the R6 approach, J-tearing instability approaches, various J-estimation schemes, LEFM approach and simplified stress analysis. Assessments were compared with the results obtained from a hydrogen charged burst test of the vessel. Predictions, based on the J-tearing approach, compared well with the actual burst test results. Actual burst pressure was about five times the operating pressure.

  10. Prediction of failure behavior of a welded pressure vessel containing flaws during a hydrogen-charged burst test

    SciTech Connect (OSTI)

    Bhuyan, G.S.; Sperling, E.J.; Shen, G.; Yin, H.; Rana, M.D.

    1999-08-01

    An industry-government collaborative program was carried out with an aim to promoting the acceptance of fracture mechanics-based fitness-for-service assessment methodology for a service-damaged pressure vessel. A collaborative round robin exercise was carried out to predict the fracture behavior of a vessel containing hydrogen damage, fabrication-related lack-of-fusion defects, an artificially induced fatigue crack, and a localized thinned area. The fracture assessment procedures used include the US ASME Material Property Council`s PREFIS Program based on the British Standard (BS) Published Document (PD) 6493, ASME Section XI and The Central Electricity Generating Board (CEGB) R6 approach, The Welding Institute (TWI) CRACKWISE program (based on BS PD6493 Level 2 approach), a variant of the R6 approach, J-tearing instability approaches, various J-estimation schemes, LEFM approach, and simplified stress analysis. Assessments were compared with the results obtained from a hydrogen-charged burst test of the vessel. Predictions, based on the J-tearing approach, compared well with the actual burst test results. Actual burst pressure was about five times the operating pressure.

  11. U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  12. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation.

  13. T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.

  14. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks

    Broader source: Energy.gov [DOE]

    RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

  15. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  16. Geothermal Literature Review (Wisian, Et Al., 2001) | Open Energy...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Wisian, Et Al., 2001) Exploration Activity Details Location Unspecified...

  17. Geothermal Literature Review (Majer, 2003) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Majer, 2003) Exploration Activity Details Location Unspecified Exploration...

  18. Geothermal Literature Review (Laney, 2005) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Laney, 2005) Exploration Activity Details Location Unspecified Exploration...

  19. Geothermal Literature Review (Mcnitt, 1978) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Mcnitt, 1978) Exploration Activity Details Location Unspecified Exploration...

  20. Ground Magnetics (Nannini, 1986) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Ground Magnetics (Nannini, 1986) Exploration Activity Details Location Unspecified Exploration...

  1. Geographic Information System (Nash, Et Al., 2002) | Open Energy...

    Open Energy Info (EERE)

    search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System (Nash, Et Al., 2002) Exploration Activity Details Location Unspecified Exploration...

  2. Aerial Photography (Nannini, 1986) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Aerial Photography (Nannini, 1986) Exploration Activity Details Location Unspecified Exploration...

  3. Modeling-Computer Simulations (Combs, Et Al., 1999) | Open Energy...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Modeling-Computer Simulations (Combs, Et Al., 1999) Exploration Activity Details Location Unspecified...

  4. Modeling-Computer Simulations (Ozkocak, 1985) | Open Energy Informatio...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Modeling-Computer Simulations (Ozkocak, 1985) Exploration Activity Details Location Unspecified...

  5. Magnetotellurics (Muse, 1973) | Open Energy Information

    Open Energy Info (EERE)

    (Muse, 1973) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Magnetotellurics (Muse, 1973) Exploration Activity Details Location Unspecified...

  6. Field Mapping (Healy, 1970) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Field Mapping (Healy, 1970) Exploration Activity Details Location Unspecified Exploration Technique...

  7. Water Sampling (Healy, 1970) | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Water Sampling (Healy, 1970) Exploration Activity Details Location Unspecified Exploration...

  8. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  9. Don't Let Your Money and Hot Water Go Down the Drain | Department of Energy

    Energy Savers [EERE]

    Disposition Schedules | Department of Energy DOERS Records Schedule Cross Index to DOE Administrative Records Disposition Schedules DOERS Records Schedule Cross Index to DOE Administrative Records Disposition Schedules Crosswalk between DOERS and Admin Schedules PDF icon DOERS Records Schedule Cross Index to DOE Administrative Records Disposition Schedules More Documents & Publications DOE Records Disposition Schedule Changes ADMINISTRATIVE RECORDS SCHEDULE 17: CARTOGRAPHIC, AERIAL

  10. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  11. BLM and NEPA: Lets`s get back to the future

    SciTech Connect (OSTI)

    Meridith, D.P.

    1995-12-01

    This talk is a personalized account of the relationship between The National Environmental Policy Act (NEPA) and the Bureau of Land Management (BLM) and the challenges the BLM faces in the future.

  12. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  13. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  14. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  15. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial...

  16. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  17. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  18. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  19. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  20. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  1. Turn Down the Temp, But Don't Let Your Pipes Freeze!

    Broader source: Energy.gov [DOE]

    Before you go crazy with turning down the thermostat really low, I'd like to point out some things you might want to keep in mind.

  2. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  3. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  4. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or instant messages. BlackBerry has described a workaround (disabling the use of JavaScript in the BlackBerry Browser) in their advisory. BlackBerry Device storage space...

  5. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  6. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  7. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  8. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  9. Let us count the ways. We've built programs that reflect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We develop computational tools, algorithms and strategies to analyze, understand, create, design and build complex engineered, natural or human systems. Contact Mark Bryden,...

  10. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  12. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  13. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  14. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  15. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  16. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  17. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with kernel level privileges.

  18. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  19. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  20. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  1. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  2. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  3. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  5. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local...

  6. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  7. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: ... the target user to a spoofed site with a URL that appears to be a legitimate domain. ...

  8. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service

    Broader source: Energy.gov [DOE]

    A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor.

  9. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  10. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  11. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  12. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  13. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  14. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

  15. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  16. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  17. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  18. Let's Try That Again: Selling the Teapot Dome Oil Field | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. Allison Lantero Allison Lantero Digital Content Specialist, Office of Public Affairs In ...

  19. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations.

  20. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  1. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Broader source: Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  2. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information.

  3. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  4. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  5. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  6. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  7. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  8. T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  9. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Broader source: Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  10. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in the slapd.conf file. 3) An error exists within the handling of certain MODRDN requests, which can be exploited to cause a crash by submitting specially crafted MODRDN requests. ...

  11. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.

  12. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  13. Distant Observer Tool Quickly Identifies Costly Flaws in CSP Fields (Fact Sheet), Highlights in Research & Development, NREL (National Renewable Energy Laboratory)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    control digital photography and metrology are combined to accurately define optical efficiency problems in concentrating solar power (CSP) plants. In a typical 100-megawatt (MW) CSP plant, an optical efficiency gain or loss of a mere 1% is worth about $600,000 in annual revenue. Hence, optimizing optical efficiency is key to the plant's economic viability. The Distant Observer (DO) tool, developed by the National Renewable Energy Laboratory (NREL), quickly and accurately measures the efficiency

  14. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  15. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  16. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  17. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  18. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system.

  19. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  20. U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in VMware ESX. A local user can obtain elevated privileges on the target system.

  1. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  2. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host.

  3. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  4. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  5. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  6. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  7. V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services

  8. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  9. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  10. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  11. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  13. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  14. From ZZ to ZH : How Low Can These Cross Sections Go or Everybody, Let's Cross Section Limbo!

    SciTech Connect (OSTI)

    Strauss, Emanuel Alexandre; /SUNY, Stony Brook

    2009-08-01

    We report on two searches performed at the D0 detector at the Fermi National Laboratory. The first is a search for Z di-boson production with a theoretical cross section of 1.4 pb. The search was performed on 2.6 fb{sup -1} of data and contributed to the first observation of ZZ production at a hadron collider. The second is a search for a low mass Standard Model Higgs in 4.2 fb{sup -1} of data. The Higgs boson is produced in association with a Z boson where the Higgs decays hadronically and the Z decays to two leptons. The ZZ search was performed in both the di-electron and di-muon channels. For the ZH search, we will focus on the muonic decays where we expanded the traditional coverage by considering events in which one of the two muons fails the selection requirement, and is instead reconstructed as an isolated track. We consider Higgs masses between 100 and 150 GeV, with theoretical cross sections ranging from 0.17 to 0.042 pb, and set upper limits on the ZH production cross-section at 95% confidence level.

  15. T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges.

  16. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  17. BrightView Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Ltd Jump to: navigation, search Name: BrightView Systems Ltd Place: Petach-Tikva, Israel Zip: 49510 Product: Has developed an unspecified technology for PV cell manufacture....

  18. Some Aspects Of Exploration In Non-Volcanic Areas | Open Energy...

    Open Energy Info (EERE)

    Aeromagnetic Survey (Nannini, 1986) Ground Gravity Survey (Nannini, 1986) Ground Magnetics (Nannini, 1986) Reflection Survey (Nannini, 1986) Areas (1) Unspecified Regions (0)...

  19. BPA-2013-01583-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Headquarters Misuse of Resources Misuse or C The Caller reported unspecified time card fraud New 50 Misappropriation of Assets or Information 09172012 BPA-12-09-0006 Raver...

  20. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - ... Configuration and Execute Arbitrary Code T-622: Adobe Acrobat and Reader Unspecified ...

  1. InSAR | Open Energy Information

    Open Energy Info (EERE)

    2007) Unspecified Advances In Geothermal Resource Exploration Circa 2007 InSAR At Brady Hot Springs Area (Laney, 2005) Brady Hot Springs Area Federal Geothermal Research...

  2. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  3. Thermochronometry (Monaster And Coolbaugh, 2007) | Open Energy...

    Open Energy Info (EERE)

    Location Unspecified Exploration Technique Thermochronometry Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  4. InSAR (Monaster And Coolbaugh, 2007) | Open Energy Information

    Open Energy Info (EERE)

    Details Location Unspecified Exploration Technique InSAR Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  5. Multispectral Imaging (Monaster And Coolbaugh, 2007) | Open Energy...

    Open Energy Info (EERE)

    Unspecified Exploration Technique Multispectral Imaging Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  6. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site...

  7. Sandia Energy Infrastructure Assurance

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind-Turbine Blade Flaw Detection Experiments in Denmark http:energy.sandia.govsandia-wind-turbine-blade-flaw-detection-experiments-in-denmark http:energy.sandia.gov...

  8. Health effects models for nuclear power plant accident consequence analysis: Low LET radiation: Part 2, Scientific bases for health effects models

    SciTech Connect (OSTI)

    Abrahamson, S.; Bender, M.; Book, S.; Buncher, C.; Denniston, C.; Gilbert, E.; Hahn, F.; Hertzberg, V.; Maxon, H.; Scott, B.

    1989-05-01

    This report provides dose-response models intended to be used in estimating the radiological health effects of nuclear power plant accidents. Models of early and continuing effects, cancers and thyroid nodules, and genetic effects are provided. Two-parameter Weibull hazard functions are recommended for estimating the risks of early and continuing health effects. Three potentially lethal early effects -- the hematopoietic, pulmonary and gastrointestinal syndromes -- are considered. Linear and linear-quadratic models are recommended for estimating cancer risks. Parameters are given for analyzing the risks of seven types of cancer in adults -- leukemia, bone, lung, breast, gastrointestinal, thyroid and ''other''. The category, ''other'' cancers, is intended to reflect the combined risks of multiple myeloma, lymphoma, and cancers of the bladder, kidney, brain, ovary, uterus and cervix. Models of childhood cancers due to in utero exposure are also provided. For most cancers, both incidence and mortality are addressed. Linear and linear-quadratic models are also recommended for assessing genetic risks. Five classes of genetic disease -- dominant, x-linked, aneuploidy, unbalanced translocation and multifactorial diseases --are considered. In addition, the impact of radiation-induced genetic damage on the incidence of peri-implantation embryo losses is discussed. The uncertainty in modeling radiological health risks is addressed by providing central, upper, and lower estimates of all model parameters. Data are provided which should enable analysts to consider the timing and severity of each type of health risk. 22 refs., 14 figs., 51 tabs.

  9. 'Let the phage do the work': Using the phage P22 coat protein structures as a framework to understand its folding and assembly mutants

    SciTech Connect (OSTI)

    Teschke, Carolyn M., E-mail: Teschke@uconn.ed [Departments of Molecular and Cell Biology, and Chemistry, 91 N. Eagleville Rd., U-3125, University of Connecticut, Storrs, CT 06269-3125 (United States); Parent, Kristin N. [Department of Chemistry and Biochemistry, University of California, San Diego, La Jolla, CA (United States)

    2010-06-05

    The amino acid sequence of viral capsid proteins contains information about their folding, structure and self-assembly processes. While some viruses assemble from small preformed oligomers of coat proteins, other viruses such as phage P22 and herpesvirus assemble from monomeric proteins (Fuller and King, 1980). The subunit assembly process is strictly controlled through protein:protein interactions such that icosahedral structures are formed with specific symmetries, rather than aberrant structures. dsDNA viruses commonly assemble by first forming a precursor capsid that serves as a DNA packaging machine. DNA packaging is accompanied by a conformational transition of the small precursor procapsid into a larger capsid for isometric viruses. Here we highlight the pseudo-atomic structures of phage P22 coat protein and rationalize several decades of data about P22 coat protein folding, assembly and maturation generated from a combination of genetics and biochemistry.

  10. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  12. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  13. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions.

  14. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  15. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods...

  16. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods...

  17. The Business Case for Fuel Cells 2014: Powering the Bottom Line...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... at an unspecified wastewater treatment plant. EMWD's digester gas-driven fuel cells will allow the District to run some of its Moreno Valley and Perris Valley Regional Water ...

  18. BPD Webinar: Analyze Building Energy Data, Understand Market...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... So let me pull up your slide, Nancy, and let you get started on that. Nancy Gonzalez: ... Nancy Gonzalez: Let's see ... So one question, Paul, on accessing data, twofold: Can raw ...

  19. fe0024293-geglobal | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Operators will be able to remedy well integrity flaws with the nXis inspection system, which will be capable of providing enhanced information about the flaw structure and...

  20. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  1. V-117: Symantec Enterprise Vault for File System Archiving Unquoted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local...

  2. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users ... Lets Remote Users Obtain Database Contents V-076: Cisco Wireless LAN Controller Bugs Let ...

  3. Mr

    U.S. Energy Information Administration (EIA) Indexed Site

    ... Let's take economics. Let's study regulation. And then we will have people like our distinguished Acting Administrator who will understand all these things extremely well. Mr. ...

  4. FEAB210 | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Pipeline Flaw Detection Using Shear EMAT and Wavelet Analysis FEAB210 Goal: The goal of this project is to develop an Electromagnetic Acoustic Transducer (EMAT) sensor, capable of detecting physical flaws in the wall of a 30-inch natural gas pipeline. These physical flaws include: stress corrosion cracking (SCC), circumferential and axial flaws, and corrosion. In addition, work will be conducted to design, fabricate, test, and integrate the EMAT sensor with an autonomous robotic platform,

  5. T-610: Red Hat kdenetwork security update

    Broader source: Energy.gov [DOE]

    A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files.

  6. U.S. DEPARTMENT OF ENERGY ENVIRONMENTAL IMPACT STATEMENTS AND ENVIRONMENTAL ASSESSMENTS

    Energy Savers [EERE]

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  7. T-632: Google Chrome OS before R12 0.12.433.38 Beta Update

    Broader source: Energy.gov [DOE]

    CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of Google Chrome OS. Prior versions of Google Chrome can be fixed by updating to the current release. Information and content related to this CVE was last updated on 05/25/2011. To find out more information about Chromium OS Security and Reported Bugs, please visit: The Chromium Projects Security Overview.

  8. T-611: Cisco IOS OCSP Revoked Certificate Security Issue

    Broader source: Energy.gov [DOE]

    The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685.

  9. Projects Selected for Safe and Permanent Geologic Storage of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and conditions related to CO2 storage including faults, fractures, and caprock flaws. ... propagation, and the formation of new fractures. (DOE share: 433,497; recipient share: ...

  10. T-559: Stack-based buffer overflow in oninit in IBM Informix...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    exploit this vulnerability. The specific flaw exists within the oninit process bound to TCP port 9088 when processing the arguments to the USELASTCOMMITTED option in a SQL query....

  11. Sandia Energy - Wind-Turbine Blade Materials and Reliability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the technology to be evaluated in terms of its probability of detection (POD). Different types and sizes of flaws were embedded into substructure components representing...

  12. Low frequency acoustic microscope

    DOE Patents [OSTI]

    Khuri-Yakub, Butrus T.

    1986-11-04

    A scanning acoustic microscope is disclosed for the detection and location of near surface flaws, inclusions or voids in a solid sample material. A focused beam of acoustic energy is directed at the sample with its focal plane at the subsurface flaw, inclusion or void location. The sample is scanned with the beam. Detected acoustic energy specularly reflected and mode converted at the surface of the sample and acoustic energy reflected by subsurface flaws, inclusions or voids at the focal plane are used for generating an interference signal which is processed and forms a signal indicative of the subsurface flaws, inclusions or voids.

  13. Microsoft PowerPoint - Vermont Stein_Solar.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Concentrating Solar Power (CSP) Solar Energy Fun Facts More energy from sunlight ... flaws Design Options 1. Site (weather data availability, uncertainty) 2. Technology ...

  14. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  15. On the approximation of crack shapes found during inservice inspection

    SciTech Connect (OSTI)

    Bhate, S.R.; Chawla, D.S.; Kushwaha, H.S.

    1997-04-01

    This paper addresses the characterization of axial internal flaw found during inservice inspection of a pipe. J-integral distribution for various flaw shapes is obtained using line spring finite, element method. The peak J-value and its distribution across the crack is found to be characteristic feature of each shape. The triangular shape yields peak J-value away from the center, the point of depth. The elliptic approximation results in large overestimate of J-value for unsymmetric flaws. Triangular approximation is recommended for such flaws so that further service can be obtained from the component.

  16. Beyond the Lone-Pair Model for Structurally Distorted Metal Oxides

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The results have important implications for the tantalizing possibility of spintronic or superconducting devices combining ferroelectric and ferromagnetic properties. Flawed but ...

  17. Image Analysis of Turbine Blades Using CT Scans| GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    exceptional potential but are hidden and undetected. These flaws can occur during the manufacturing processes of turbine blades in a jet or gas engine. If large enough, they...

  18. T-701: Citrix Access Gateway Enterprise Edition Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input...

  19. Sandia Energy Monitoring

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    rspace-warning-area-established-to-aid-research-explorationfeed 0 Sandia Wind-Turbine Blade Flaw Detection Experiments in Denmark http:energy.sandia.govsandia-wind-turbine-bla...

  20. DOE - Office of Legacy Management -- University of Michigan ...

    Office of Legacy Management (LM)

    with a supersonic reflectroscope to detect flaws within a metal slug and developed methods for testing the adequacy of coatings which are applied to pieces of uranium metal....

  1. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute ... Lets Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid ...

  2. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local ... Scripting and URL Redirection Attacks V-151: RSA Archer eGRC Bugs Let Remote ...

  3. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  4. QER- Comment of Xcel Energy

    Broader source: Energy.gov [DOE]

    Attached are the comments of Xcel Energy Services Inc. Please let me know if you have any questions.

  5. Emissivity corrected infrared method for imaging anomalous structural heat flows

    DOE Patents [OSTI]

    Del Grande, Nancy K.; Durbin, Philip F.; Dolan, Kenneth W.; Perkins, Dwight E.

    1995-01-01

    A method for detecting flaws in structures using dual band infrared radiation. Heat is applied to the structure being evaluated. The structure is scanned for two different wavelengths and data obtained in the form of images. Images are used to remove clutter to form a corrected image. The existence and nature of a flaw is determined by investigating a variety of features.

  6. Risk assessment of turbine rotor failure using probabilistic ultrasonic non-destructive evaluations

    SciTech Connect (OSTI)

    Guan, Xuefei; Zhang, Jingdan; Zhou, S. Kevin; Rasselkorde, El Mahjoub; Abbasi, Waheed A.

    2014-02-18

    The study presents a method and application of risk assessment methodology for turbine rotor fatigue failure using probabilistic ultrasonic nondestructive evaluations. A rigorous probabilistic modeling for ultrasonic flaw sizing is developed by incorporating the model-assisted probability of detection, and the probability density function (PDF) of the actual flaw size is derived. Two general scenarios, namely the ultrasonic inspection with an identified flaw indication and the ultrasonic inspection without flaw indication, are considered in the derivation. To perform estimations for fatigue reliability and remaining useful life, uncertainties from ultrasonic flaw sizing and fatigue model parameters are systematically included and quantified. The model parameter PDF is estimated using Bayesian parameter estimation and actual fatigue testing data. The overall method is demonstrated using a realistic application of steam turbine rotor, and the risk analysis under given safety criteria is provided to support maintenance planning.

  7. PSH-15-0078 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 8 - In the Matter of Personnel Security Hearing PSH-15-0078 - In the Matter of Personnel Security Hearing On March 23, 2016, an OHA Administrative Judge issued a decision in which he concluded that an individual's security clearance should not be restored. A DOE consulting psychiatrist evaluated the individual and concluded that he met the DSM 5 criteria for Unspecified Neurocognitive Disorder on the basis of observed impairments in memory and attention and variable performance on

  8. PARALLELS OF RADIATION- AND FINANCIAL-RISK MANAGEMENT ON PUBLIC ACCEPTANCE

    SciTech Connect (OSTI)

    Hogue, M.

    2010-01-04

    The financial collapse of 2007 provides an opportunity for a cross-discipline comparison of risk assessments. Flaws in financial risk assessments bear part of the blame for the financial collapse. There may be a potential for similar flaws to be made in radiological risk assessments. Risk assessments in finance and health physics are discussed in the context of a broader view of the risk management environment. Flawed risk assessments can adversely influence public acceptance of radiological technologies, so the importance of quality is magnified.

  9. Observations on Characterization of Defects in Coiled Tubing From Magnetic-Flux-Leakage Data

    SciTech Connect (OSTI)

    Timothy R. McJunkin; Karen S. Miller; Charles R. Tolle

    2006-04-01

    This paper presents observations on the sizing of automatically detected artificial flaws in coiled tubing samples using magnetic-flux-leakage data. Sixty-six artificial flaws of various shapes and types, ranging from 0.30 mm deep pits to slots with length of 9.5 mm, in 44.45 mm outer diameter pipe were analyzed. The detection algorithm and the information automatically extracted from the data are described. Observations on the capabilities and limitations for determining the size and shape of the flaws are discussed.

  10. Genomic Sequence of a Marine Blooming Alga | U.S. DOE Office of Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 (Technical Report) | SciTech Connect Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 Citation Details In-Document Search Title: Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure:

  11. Science | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Science Highlights Intense X-rays expose tiny flaws in 3-D printed titanium that can lead to breakage over time March 4, 2016 Could the future of low-power computing be magnetism? ...

  12. Science Highlights | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... the presence of pores, in a 3-D printed titanium alloy, Ti-6Al-4V. This image shows ... X-rays expose tiny flaws in 3-D printed titanium that can lead to breakage over time To ...

  13. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Mulligan, Anthony C.; Rigali, Mark J.; Sutaria, Manish P.; Popovich, Dragan; Halloran, Joseph P.; Fulcher, Michael L.; Cook, Randy C.

    2009-04-14

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  14. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Mulligan, Anthony C.; Rigali, Mark J.; Sutaria, Manish P.; Popovich, Dragan; Halloran, Joseph P.; Fulcher, Michael L.; Cook, Randy C.

    2005-12-13

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  15. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Rigali, Mark J.; Sutaria, Manish P.; Mulligan, Anthony C.; Popovich, Dragan

    2004-03-23

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  16. Timeline of Events: 2004 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... laboratory corrects the systematic flaws that allowed this ... to Congress a report-Our Changing Planet-on the Bush ... as part of a science education initiative he launched ...

  17. BPA-2015-01296-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    It is from the Aprill4, 2015letter from DW Gregoire of Energy Northwest to the NRC with subject: COLUMBIA GENERATING STATION, DOCKET NO. 50-397 DEVIATION FROM BWRVIP FLAW...

  18. Brittle Failure Design Criteria for Ductile Cast Iron Spent-Fuel

    Office of Scientific and Technical Information (OSTI)

    ... Safety The establishment of appropriate safety factors has a long history of controversy. ... flaw sizes to those that state-of-the-art NDE would not guarantee as being detectable ...

  19. Ultrasonic examination of the heavy section test blocks for hydroprocessing reactors used by the petroleum industry

    SciTech Connect (OSTI)

    Dodd, F.J.; Zhang, Y.; Imgram, A.

    1995-12-01

    An 18-inch (457 mm) thick Cr-Mo steel test block with an austenitic stainless steel ID cladding was designed and fabricated at the direction of the Material Properties Council in cooperation with the Pressure Vessel Research Committee (PVRC) Committee on Nondestructive Examination of Components. The test block contains several embedded flaws located near both ID and OD surfaces. Chevron Research and Technology Company and WesDyne International conducted the initial UT Examinations on this block at Chevron. In addition, a 10-inch (254 mm) thick block with embedded flaws was also examined. All the flaws m the two blocks were either cracks or lack of fusion. The examination results demonstrate the feasibility of UT to detect and size flaws in hydroprocessing reactor vessels and provide a basis to compare the relative capabilities of UT with the radiographic (RT) inspections currently required by the fabrication code.

  20. Getting It Right: Accurate Testing and Assessments Critical to Deploying the Next Generation of Auto Fuels

    Broader source: Energy.gov [DOE]

    Today, the Coordinating Research Council released a report on the effects of E15 and E20 on vehicle engines. We, at the Energy Department, believe the study is significantly flawed.

  1. Voluntary Initiative: Designing Incentives Toolkit | Department...

    Office of Environmental Management (EM)

    & Publications Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Better Buildings Network View | March 2015 Spotlight on Austin, Texas: Best...

  2. "Title","Creator/Author","Publication Date","OSTI Identifier...

    Office of Scientific and Technical Information (OSTI)

    Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September...

  3. Genome Wide Evaluation of Normal Human Tissue in Response to...

    Office of Scientific and Technical Information (OSTI)

    Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 Rocke,...

  4. Be a Safe and Efficient Winter Driver

    Broader source: Energy.gov [DOE]

    We've been advising you on ways to make the home more energy smart, so let's talk about your car for a moment.

  5. U.S. Department of Energy Interim E-QIP Procedures | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Energy Security Symposium OE Releases Second Issue of Energy Emergency Preparedness Quarterly (April 2012) V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets...

  6. ALSNews Vol. 327

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Beamlines ALS in the News: Keep Up with Our News Releases, and Let Us Keep Up with Yours Winter 2012 Shutdown Update Ring Leaders: Director's Address Announcements: Science...

  7. Incident Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Offices, and other DOE organizations with access to DOE cyber systems report cyber ... September 5, 2013 V-235: Cisco Mobility Services Engine Configuration Error Lets Remote ...

  8. Microsoft Word - CNMSUG-Meeting_09-25-08_minutes_v2.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to let CNMS management know what improvements would be most helpful User proposal process improvements: CNMS is moving toward a joint, online, fully electronic submission...

  9. How to Apply

    Broader source: Energy.gov [DOE]

    Awards are made through a formal process that has changed dramatically since 2011. So let us walk you through it step by step.

  10. Monthly Performance Report

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Nationals Visit Cocooned Reactors - On November 17, 2015, ... SOEs flushed the line with sodium hypochlorite, let it sit ... truck assigned to WRPS's Fast facility maintenance group. ...

  11. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  12. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  13. DOE 2014 Biomass Conference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuels & Vehicle Standards * Let Free Markets Work - Mandates and subsidies ... (proposed) 100 250 500 1,000 1,750 3,000 Volume (Million Gallons) *Cellulosic production ...

  14. White House Highlights Two Energy-Slashing, Open Data Initiatives...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... The Buildings Performance Database lets users mine anonymous statistical data from real buildings that match a specific building characteristic profile, enabling real estate ...

  15. Celebrating and supporting women

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Workshop titles ranged from "Computational Thinking" and "Crystal Craziness" to "Sports Nutrition" and "Ocean Density, Currents and Ice." In the "Let's go to the River ...

  16. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain ... Authentication Bypass Vulnerability T-614: Cisco Unified Communications Manager ...

  17. V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2044373) Addthis Related Articles U-128: VMware ESXESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges T-552: Cisco Nexus 1000V...

  18. Country-Fried Biofuels

    Broader source: Energy.gov [DOE]

    Instead of tossing your grease and used cooking oil, let a clean cities coordinator in your area help recycle it into biodiesel.

  19. Science Careers in Search of Women | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    now, and let us make our dreams tomorrow's reality." -Malala Yousafzai, 2014 Nobel Peace Prize Laurate Argonne Education, in conjunction with Women in Science and Technology,...

  20. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service ... Adapters Interface Processor Vulnerability V-135: Cisco ASA Multiple Bugs Let Remote ...

  1. Energy Efficiency Post-2011 Review Scoping Document and Process...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workgroups, please let BPA know in your submitted comments. I. Overview and Timeline The "Energy Efficiency Post-2011 Review" (Review) is a public process to review and consider...

  2. Pueblo of Laguna Utility Authority

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TRIBAL UTILITY KAWAIKA HANU INTERNET LET US GET YOU CONNECTED Kawaika Hanu is your local internet service provider offering high speed internet with competitive rates. ...

  3. QER- Comment of National Rural Electric Cooperative Association 4

    Broader source: Energy.gov [DOE]

    NRECA is submitting additional comments to supplement the one previously filed on October 3rd. Please let me know if you have any questions.

  4. EPA Launches 2014 National Building Competition

    Broader source: Energy.gov [DOE]

    Let the battle begin! The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014 National Building Competition.

  5. Slide 1

    Office of Environmental Management (EM)

    were to let a single contract for the whole decommissioning task. * Cost prohibitive ... still providing correct engagement 1. Black and white radiation tolerant multi-camera ...

  6. Fermilab F

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    please let us know. Sincerely, Michael Witherell Attachment cc: K. Stanfield H. Montgomery S. Holmes J. Appel Excerpt from April 2004 PAC Recommendations P-938 MINERA...

  7. U-267: RSA Authentication Agent 7.1 for Microsoft Windows...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  8. Fiona Ginty | Inventors | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a new biomarker technology platform against multiple cancers. The Road Taken Culture, art, food and work have all let Fiona travel the world. And she's taken critical lessons...

  9. American Institute of Architects 2030 Commitment Enabled by Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    American Institute of Architects 2030 Commitment Enabled by Energy IQ - 2014 BTO Peer Review American ... More Documents & Publications The Design Data Exchange (DDx) lets 2030 ...

  10. Microsoft PowerPoint - PD_Mitlyng

    Office of Environmental Management (EM)

    offered on high-interest topics such as hurricane preparedness, seismic studies and Fukushima lessons learned * All Chats were archived Let's Chat: 9 8 * Very resource-intensive - ...

  11. U.S. DEPARTMENT OF ENERGY * SAVANNAH RIVER SITE * AIKEN * SC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SoundAnchor(tm) Nondestructive Testing Method The SoundAnchor(tm) method uses ultrasonic energy for volumetric assessment of subterranean tower anchor rods without unearthing the individual rods or destabilizing the structure. Flaws in anchor rods can degrade their performance and cause catastrophic collapse of towers. Such flaws can be difficult to detect and normally occur below ground. Only a small portion of the anchor rod is exposed with the remaining portion buried in the earth. The far

  12. Emissivity corrected infrared method for imaging anomalous structural heat flows

    DOE Patents [OSTI]

    Del Grande, N.K.; Durbin, P.F.; Dolan, K.W.; Perkins, D.E.

    1995-08-22

    A method for detecting flaws in structures using dual band infrared radiation is disclosed. Heat is applied to the structure being evaluated. The structure is scanned for two different wavelengths and data obtained in the form of images. Images are used to remove clutter to form a corrected image. The existence and nature of a flaw is determined by investigating a variety of features. 1 fig.

  13. Reactor Pressure Vessel Fracture Analysis Capabilities in Grizzly

    SciTech Connect (OSTI)

    Spencer, Benjamin; Backman, Marie; Chakraborty, Pritam; Hoffman, William

    2015-03-01

    Efforts have been underway to develop fracture mechanics capabilities in the Grizzly code to enable it to be used to perform deterministic fracture assessments of degraded reactor pressure vessels (RPVs). Development in prior years has resulted a capability to calculate -integrals. For this application, these are used to calculate stress intensity factors for cracks to be used in deterministic linear elastic fracture mechanics (LEFM) assessments of fracture in degraded RPVs. The -integral can only be used to evaluate stress intensity factors for axis-aligned flaws because it can only be used to obtain the stress intensity factor for pure Mode I loading. Off-axis flaws will be subjected to mixed-mode loading. For this reason, work has continued to expand the set of fracture mechanics capabilities to permit it to evaluate off-axis flaws. This report documents the following work to enhance Grizzly’s engineering fracture mechanics capabilities for RPVs: • Interaction Integral and -stress: To obtain mixed-mode stress intensity factors, a capability to evaluate interaction integrals for 2D or 3D flaws has been developed. A -stress evaluation capability has been developed to evaluate the constraint at crack tips in 2D or 3D. Initial verification testing of these capabilities is documented here. • Benchmarking for axis-aligned flaws: Grizzly’s capabilities to evaluate stress intensity factors for axis-aligned flaws have been benchmarked against calculations for the same conditions in FAVOR. • Off-axis flaw demonstration: The newly-developed interaction integral capabilities are demon- strated in an application to calculate the mixed-mode stress intensity factors for off-axis flaws. • Other code enhancements: Other enhancements to the thermomechanics capabilities that relate to the solution of the engineering RPV fracture problem are documented here.

  14. Nondestructive ultrasonic testing of materials

    DOE Patents [OSTI]

    Hildebrand, Bernard P.

    1994-01-01

    Reflection wave forms obtained from aged and unaged material samples can be compared in order to indicate trends toward age-related flaws. Statistical comparison of a large number of data points from such wave forms can indicate changes in the microstructure of the material due to aging. The process is useful for predicting when flaws may occur in structural elements of high risk structures such as nuclear power plants, airplanes, and bridges.

  15. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  16. Nondestructive ultrasonic testing of materials

    DOE Patents [OSTI]

    Hildebrand, B.P.

    1994-08-02

    Reflection wave forms obtained from aged and unaged material samples can be compared in order to indicate trends toward age-related flaws. Statistical comparison of a large number of data points from such wave forms can indicate changes in the microstructure of the material due to aging. The process is useful for predicting when flaws may occur in structural elements of high risk structures such as nuclear power plants, airplanes, and bridges. 4 figs.

  17. RangeTables.xls

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (MeVcmmg) LET vs. Range in Si for 25 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 600 1200 1800 2400 3000 3600 4 He 14 N 22 Ne 0 1 2 3 4 5 6 7 8 9 10 0 100 200 300 400 500...

  18. RangeTables.xlsx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vcmmg) LET vs. Range in Si for 15 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 200 400 600 800 1000 1200 1400 Range in Silicon (m) 4 He 14 N 20 Ne 0 1 2 3 4 5 0 50 100 150...

  19. Useful Graphs and Charts - Ion Beams - Radiation Effects Facility /

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyclotron Institute / Texas A&M University Ion Beams Available Beams / Beam Change Times / Measurements / Useful Graphs Useful Graphs and Charts LET vs. Range in Si Graphs: 15 MeV/u Beams 24.8 MeV/u Beams 40 MeV/u Beams Beam energy, Let and range in si at various air-gaps from rear foil: 15 MeV/u Beams 24.8 and 40 MeV/u Beams Quick Links Beam Characterization and verification Beam List Beam Change Times 15 MeV/u LET vs Range Graph 25 MeV/u LET vs Range Graph 40 Mev/u LET vs Range Graph

  20. Initial Probabilistic Evaluation of Reactor Pressure Vessel Fracture with Grizzly and Raven

    SciTech Connect (OSTI)

    Spencer, Benjamin; Hoffman, William; Sen, Sonat; Rabiti, Cristian; Dickson, Terry; Bass, Richard

    2015-10-01

    The Grizzly code is being developed with the goal of creating a general tool that can be applied to study a variety of degradation mechanisms in nuclear power plant components. The first application of Grizzly has been to study fracture in embrittled reactor pressure vessels (RPVs). Grizzly can be used to model the thermal/mechanical response of an RPV under transient conditions that would be observed in a pressurized thermal shock (PTS) scenario. The global response of the vessel provides boundary conditions for local models of the material in the vicinity of a flaw. Fracture domain integrals are computed to obtain stress intensity factors, which can in turn be used to assess whether a fracture would initiate at a pre-existing flaw. These capabilities have been demonstrated previously. A typical RPV is likely to contain a large population of pre-existing flaws introduced during the manufacturing process. This flaw population is characterized stastistically through probability density functions of the flaw distributions. The use of probabilistic techniques is necessary to assess the likelihood of crack initiation during a transient event. This report documents initial work to perform probabilistic analysis of RPV fracture during a PTS event using a combination of the RAVEN risk analysis code and Grizzly. This work is limited in scope, considering only a single flaw with deterministic geometry, but with uncertainty introduced in the parameters that influence fracture toughness. These results are benchmarked against equivalent models run in the FAVOR code. When fully developed, the RAVEN/Grizzly methodology for modeling probabilistic fracture in RPVs will provide a general capability that can be used to consider a wider variety of vessel and flaw conditions that are difficult to consider with current tools. In addition, this will provide access to advanced probabilistic techniques provided by RAVEN, including adaptive sampling and parallelism, which can dramatically decrease run times.

  1. ORNL Evaluation of Electrabel Safety Cases for Doel 3 / Tihange 2: Final Report

    SciTech Connect (OSTI)

    Bass, Bennett Richard; Dickson, Terry L.; Gorti, Sarma B.; Klasky, Hilda B.; Nanstad, Randy K.; Sokolov, Mikhail A.; Williams, Paul T.; Server, W. L.

    2015-11-01

    Oak Ridge National Laboratory (ORNL) performed a detailed technical review of the 2015 Electrabel (EBL) Safety Cases prepared for the Belgium reactor pressure vessels (RPVs) at Doel 3 and Tihange 2 (D3/T2). The Federal Agency for Nuclear Control (FANC) in Belgium commissioned ORNL to provide a thorough assessment of the existing safety margins against cracking of the RPVs due to the presence of almost laminar flaws found in each RPV. Initial efforts focused on surveying relevant literature that provided necessary background knowledge on the issues related to the quasilaminar flaws observed in D3/T2 reactors. Next, ORNL proceeded to develop an independent quantitative assessment of the entire flaw population in the two Belgian reactors according to the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code, Section XI, Appendix G, Fracture Toughness Criteria for Protection Against Failure, New York (1992 and 2004). That screening assessment of all EBL-characterized flaws in D3/T2 used ORNL tools, methodologies, and the ASME Code Case N-848, Alternative Characterization Rules for QuasiLaminar Flaws . Results and conclusions from the ORNL flaw acceptance assessments of D3/T2 were compared with those from the 2015 EBL Safety Cases. Specific findings of the ORNL evaluation of that part of the EBL structural integrity assessment focusing on stability of the flaw population subjected to primary design transients include the following: ORNL s analysis results were similar to those of EBL in that very few characterized flaws were found not compliant with the ASME (1992) acceptance criterion. ORNL s application of the more recent ASME Section XI (2004) produced only four noncompliant flaws, all due to LOCAs. The finding of a greater number of non-compliant flaws in the EBL screening assessment is due principally to a significantly more restrictive (conservative) criterion for flaw size acceptance used by EBL. ORNL s screening assessment results (obtained using an analysis methodology different from that of EBL) are interpreted herein as confirming the EBL screening results for D3/T2. ORNL s independent refined analysis demonstrated the EBL-characterized flaw 1660, which is non-compliant in the ORNL and EBL screening assessment, is rendered compliant when modeled as a more realistic individual quasi-laminar flaw using a 3-D XFEM analysis approach. ORNL s and EBL s refined analyses are in good agreement for the flaw 1660 close to the clad/base metal interface; ORNL is not persuaded that repeating this exercise for more than one non-compliant flaw is necessary to accept the EBL conclusions derived from the aggregate of EBL refined analysis results. ORNL General Conclusions Regarding the Structural Integrity Assessment (SIA) Conducted by EBL for D3/T2 Based on comparative evaluations of ORNL and EBL SIA analyses and on consideration of other results, ORNL is in agreement with the general conclusions reported by Electrabel in their RPV D3/T2 Technical Summary Note of April 14, 2015: More than 99 percent of flaws in D3/T2 meet the defined screening criterion, rendering them benign with respect to initiation in the event of a design transient. Refined analyses of non-compliant flaws from the screening assessment indicate that only 11 of the 16196 detected flaws have a critical reference-temperature material index (designated RTNDT) that implies the possibility of the initiation of cleavage fracture at some future time. For those 11 2 flaws, the calculated margin in RTNDT (a measure of acceptable embrittlement relative to end-ofservice-life conditions) is significant, being greater than 80 C. Fatigue crack growth is not a concern in the flaw-acceptability analyses. Primary stress re-evaluation confirms that the collapse pressure is more than 1.5 times the design pressure in the presence of defects detected in D3/T2. Sufficient conservatisms are built into the input data and into the different steps of the SIA; in some cases, those conservatisms are quantified and imply that additional margins exist in the SIA. Taken as a whole, the foregoing results and conclusions confirm the structural integrity of Doel 3 and Tihange 2 under all design transients with ample margin in the presence of the 16196 detected flaws.

  2. Controlled quantum-state transfer in a spin chain

    SciTech Connect (OSTI)

    Gong, Jiangbin [Department of Physics and Center for Computational Science and Engineering, National University of Singapore, 117542 (Singapore); Brumer, Paul [Chemical Physics Theory Group and Center for Quantum Information and Quantum Control, University of Toronto, Toronto M5S 3H6 (Canada)

    2007-03-15

    Control of the transfer of quantum information encoded in quantum wave packets moving along a spin chain is demonstrated. Specifically, based on a relationship with control in a paradigm of quantum chaos, it is shown that wave packets with slow dispersion can automatically emerge from a class of initial superposition states involving only a few spins, and that arbitrary unspecified traveling wave packets can be nondestructively stopped and later relaunched with perfection. The results establish an interesting application of quantum chaos studies in quantum information science.

  3. Processing ultrasonic inspection data from multiple scan patterns for turbine rotor weld build-up evaluations

    SciTech Connect (OSTI)

    Guan, Xuefei; Zhou, S. Kevin; Rasselkorde, El Mahjoub; Abbasi, Waheed

    2015-03-31

    The study presents a data processing methodology for weld build-up using multiple scan patterns. To achieve an overall high probability of detection for flaws with different orientations, an inspection procedure with three different scan patterns is proposed. The three scan patterns are radial-tangential longitude wave pattern, axial-radial longitude wave pattern, and tangential shear wave pattern. Scientific fusion of the inspection data is implemented using volume reconstruction techniques. The idea is to perform spatial domain forward data mapping for all sampling points. A conservative scheme is employed to handle the case that multiple sampling points are mapped to one grid location. The scheme assigns the maximum value for the grid location to retain the largest equivalent reflector size for the location. The methodology is demonstrated and validated using a realistic ring of weld build-up. Tungsten balls and bars are embedded to the weld build-up during manufacturing process to represent natural flaws. Flat bottomed holes and side drilled holes are installed as artificial flaws. Automatic flaw identification and extraction are demonstrated. Results indicate the inspection procedure with multiple scan patterns can identify all the artificial and natural flaws.

  4. Using Phased Array Ultrasonic Testing in Lieu of Radiography for Acceptance of Carbon Steel Piping Welds

    SciTech Connect (OSTI)

    Moran, Traci L.; Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Nove, Carol A.

    2014-08-01

    The Pacific Northwest National Laboratory (PNNL) is conducting studies for the U.S. Nuclear Regulatory Commission (NRC) to assess the capability, effectiveness, and reliability of ultrasonic testing (UT) as a replacement method for radiographic testing (RT) for volumetric examination of nuclear power plant (NPP) components. This particular study focused on evaluating the use of UT on carbon steel plate welds. Welding fabrication flaws included a combination of planar and volumetric types, e.g., incomplete fusion, lack of penetration, cracks, porosity, and slag inclusions. The examinations were conducted using phased-array (PA) UT techniques applied primarily for detection and flaw type characterization. This paper will discuss the results of using UT in lieu of RT for detection and classification of fabrication flaws in carbon steel plate welds.

  5. Single crystal metal wedges for surface acoustic wave propagation

    DOE Patents [OSTI]

    Fisher, E.S.

    1980-05-09

    An ultrasonic testing device has been developed to evaluate flaws and inhomogeneities in the near-surface region of a test material. A metal single crystal wedge is used to generate high frequency Rayleigh surface waves in the test material surface by conversion of a slow velocity, bulk acoustic mode in the wedge into a Rayleigh wave at the metal-wedge test material interface. Particular classes of metals have been found to provide the bulk acoustic modes necessary for production of a surface wave with extremely high frequency and angular collimation. The high frequency allows flaws and inhomogeneities to be examined with greater resolution. The high degree of angular collimation for the outgoing ultrasonic beam permits precision angular location of flaws and inhomogeneities in the test material surface.

  6. Single crystal metal wedges for surface acoustic wave propagation

    DOE Patents [OSTI]

    Fisher, Edward S.

    1982-01-01

    An ultrasonic testing device has been developed to evaluate flaws and inhomogeneities in the near-surface region of a test material. A metal single crystal wedge is used to generate high frequency Rayleigh surface waves in the test material surface by conversion of a slow velocity, bulk acoustic mode in the wedge into a Rayleigh wave at the metal-wedge test material interface. Particular classes of metals have been found to provide the bulk acoustic modes necessary for production of a surface wave with extremely high frequency and angular collimation. The high frequency allows flaws and inhomogeneities to be examined with greater resolution. The high degree of angular collimation for the outgoing ultrasonic beam permits precision angular location of flaws and inhomogeneities in the test material surface.

  7. Weld defect distributions in offshore structures and their influence on structural reliability

    SciTech Connect (OSTI)

    Rogerson, J.H.; Wong, W.K.

    1982-01-01

    Failure by fracture is a serious possible fracture mode of steel offshore structures particularly in hostile, low-temperature environments. Such fracture usually initiates from flaws in regions of stress concentration. For any probabilistic failure analysis to be credible, it is necessary to have a good estimate of the flaw size and distribution. For fixed steel platforms the important flaw size distribution is the distribution of defect height in welds in node connections. Previous work has shown that different structures have similar defect distributions which suggests that a function can be derived for the generality of such structures. Data has been analyzed relating to > 1000 m of weld in one North Sea structure. From this can be seen that a Weibull distribution is the appropriate function to use for defect height. Conclusions also are drawn about the required reliability of even an imperfect inspection and repair technique to significantly reduce failure probability.

  8. Crack detection using resonant ultrasound spectroscopy

    DOE Patents [OSTI]

    Migliori, Albert; Bell, Thomas M.; Rhodes, George W.

    1994-01-01

    Method and apparatus are provided for detecting crack-like flaws in components. A plurality of exciting frequencies are generated and applied to a component in a dry condition to obtain a first ultrasonic spectrum of the component. The component is then wet with a selected liquid to penetrate any crack-like flaws in the component. The plurality of exciting frequencies are again applied to the component and a second ultrasonic spectrum of the component is obtained. The wet and dry ultrasonic spectra are then analyzed to determine the second harmonic components in each of the ultrasonic resonance spectra and the second harmonic components are compared to ascertain the presence of crack-like flaws in the component.

  9. Crack detection using resonant ultrasound spectroscopy

    DOE Patents [OSTI]

    Migliori, A.; Bell, T.M.; Rhodes, G.W.

    1994-10-04

    Method and apparatus are provided for detecting crack-like flaws in components. A plurality of exciting frequencies are generated and applied to a component in a dry condition to obtain a first ultrasonic spectrum of the component. The component is then wet with a selected liquid to penetrate any crack-like flaws in the component. The plurality of exciting frequencies are again applied to the component and a second ultrasonic spectrum of the component is obtained. The wet and dry ultrasonic spectra are then analyzed to determine the second harmonic components in each of the ultrasonic resonance spectra and the second harmonic components are compared to ascertain the presence of crack-like flaws in the component. 5 figs.

  10. Inquiring Minds - Questions About Physics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Getting particles for the accelerator Hi I am 11 and my name is Joshua Pevitz. When I grow up I want to work at Fermilab. I was wondering if you could explain to me about how you let only one atom in the accelerator, if everything is made out of atoms? Your admirer, Joshua Pevitz Dear Joshua, Thanks for your interesting question! Let me give you the simple answer first, and then I will explain. We do not let only one atom at a time into the accelerator. Instead we have more than 10 trillion

  11. System for measuring temporal profiles of scintillation at high and different linear energy transfers by using pulsed ion beams

    SciTech Connect (OSTI)

    Koshimizu, Masanori Asai, Keisuke; Kurashima, Satoshi; Taguchi, Mitsumasa; Kimura, Atsushi; Iwamatsu, Kazuhiro

    2015-01-15

    We have developed a system for measuring the temporal profiles of scintillation at high linear energy transfer (LET) by using pulsed ion beams from a cyclotron. The half width at half maximum time resolution was estimated to be 1.52.2 ns, which we attributed mainly to the duration of the pulsed ion beam and timing jitter between the trigger signal and the arrival of the ion pulse. The temporal profiles of scintillation of BaF{sub 2} at different LETs were successfully observed. These results indicate that the proposed system is a powerful tool for analyzing the LET effects in temporal profiles of scintillation.

  12. An Empirical Study on Ultrasonic Testing in Lieu of Radiography for Nuclear Power Plants

    SciTech Connect (OSTI)

    Moran, Traci L.; Pardini, Allan F.; Ramuhalli, Pradeep; Prowant, Matthew S.; Mathews, Royce

    2012-09-01

    Research is being conducted for the U.S. Nuclear Regulatory Commission (NRC) at the Pacific Northwest National Laboratory (PNNL) to assess the capability, effectiveness, and reliability of ultrasonic testing (UT) as a replacement method for radiographic testing (RT) for inspecting nuclear power plant (NPP) components. A primary objective of this work is to evaluate UT techniques to assess their ability to detect, locate, size, and characterize fabrication flaws in typical NPP weldments. This particular study focused on the evaluation of four carbon steel pipe-to-pipe welds on specimens that ranged in thicknesses from 19.05 mm (0.75 in.) to 27.8 mm (1.094 in.) and were 355.6 mm (14.0 in.) or 406.4 mm (16.0 in.) in diameter. The pipe welds contained both implanted (intentional) fabrication flaws as well as bonus (unintentional) flaws throughout the entire thickness of the weld and the adjacent base material. The fabrication flaws were a combination of planar and volumetric flaw types, including incomplete fusion, incomplete penetration, cracks, porosity, and slag inclusions. The examinations were conducted using phased-array UT (PA UT) techniques applied primarily for detection and length sizing of the flaws. Radiographic examinations were also conducted on the specimens with RT detection and length sizing results being used to establish true state. This paper will discuss the comparison of UT and RT (true state) detection results conducted to date along with a discussion on the technical gaps that need to be addressed before these methods can be used interchangeably for repair and replacement activities for NPP components.

  13. Concurrent ultrasonic weld evaluation system

    DOE Patents [OSTI]

    Hood, D.W.; Johnson, J.A.; Smartt, H.B.

    1987-12-15

    A system for concurrent, non-destructive evaluation of partially completed welds for use in conjunction with an automated welder is disclosed. The system utilizes real time, automated ultrasonic inspection of a welding operation as the welds are being made by providing a transducer which follows a short distance behind the welding head. Reflected ultrasonic signals are analyzed utilizing computer based digital pattern recognition techniques to discriminate between good and flawed welds on a pass by pass basis. The system also distinguishes between types of weld flaws. 5 figs.

  14. Method for resonant measurement

    DOE Patents [OSTI]

    Rhodes, George W.; Migliori, Albert; Dixon, Raymond D.

    1996-01-01

    A method of measurement of objects to determine object flaws, Poisson's ratio (.sigma.) and shear modulus (.mu.) is shown and described. First, the frequency for expected degenerate responses is determined for one or more input frequencies and then splitting of degenerate resonant modes are observed to identify the presence of flaws in the object. Poisson's ratio and the shear modulus can be determined by identification of resonances dependent only on the shear modulus, and then using that shear modulus to find Poisson's ratio using other modes dependent on both the shear modulus and Poisson's ratio.

  15. Results of fracture mechanics analyses of the ederer cranes in the device assembly

    SciTech Connect (OSTI)

    Dalder, E.

    1996-08-01

    Fracture mechanics analyses were conducted on three critical locations on the lower flange of the load-beam of the Ederer 5 ton and 4 ton cranes in the D.A.F. Facility. Based on these results, it appears that: 1. Propagation of a 5 mm long flaw, previously undetected by non-destructive examination (NDE), to a length sufficient to cause structural failure of either flange, should not occur in at least 100 times the postulated operating scenarios for each crane; 2. Should each crane undergo annual inspection, any surface flaw with a length greater that 20 mm should be removed and repaired by qualified and approved repair procedures.

  16. Photo Gallery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laser Bay <h3>Programmable Spatial Shaper</h3>A system of customized spatial light modulators called "spatial shapers" has been installed in the preamplifier modules (PAMs) at the front end of the NIF laser system. The spatial shapers can obscure the laser light at programmed locations within the beam profile to keep the light from striking small, isolated flaws on downstream optical components. Such flaws can act as small initiation sites for damage that could grow during

  17. Non-destructive testing method and apparatus utilizing phase multiplication holography

    DOE Patents [OSTI]

    Collins, H. Dale (Richland, WA); Prince, James M. (Kennewick, WA); Davis, Thomas J. (Richland, WA)

    1984-01-01

    An apparatus and method for imaging of structural characteristics in test objects using radiation amenable to coherent signal processing methods. Frequency and phase multiplication of received flaw signals is used to simulate a test wavelength at least one to two orders of magnitude smaller than the actual wavelength. The apparent reduction in wavelength between the illumination and recording radiation performs a frequency translation hologram. The hologram constructed with a high synthetic frequency and flaw phase multiplication is similar to a conventional acoustic hologram construction at the high frequency.

  18. Method for resonant measurement

    DOE Patents [OSTI]

    Rhodes, G.W.; Migliori, A.; Dixon, R.D.

    1996-03-05

    A method of measurement of objects to determine object flaws, Poisson`s ratio ({sigma}) and shear modulus ({mu}) is shown and described. First, the frequency for expected degenerate responses is determined for one or more input frequencies and then splitting of degenerate resonant modes are observed to identify the presence of flaws in the object. Poisson`s ratio and the shear modulus can be determined by identification of resonances dependent only on the shear modulus, and then using that shear modulus to find Poisson`s ratio using other modes dependent on both the shear modulus and Poisson`s ratio. 1 fig.

  19. Concurrent ultrasonic weld evaluation system

    DOE Patents [OSTI]

    Hood, D.W.; Johnson, J.A.; Smartt, H.B.

    1985-09-04

    A system for concurrent, non-destructive evaluation of partially completed welds for use in conjunction with an automated welder. The system utilizes real time, automated ultrasonic inspection of a welding operation as the welds are being made by providing a transducer which follows a short distance behind the welding head. Reflected ultrasonic signals are analyzed utilizing computer based digital pattern recognition techniques to discriminate between good and flawed welds on a pass by pass basis. The system also distinguishes between types of weld flaws.

  20. Concurrent ultrasonic weld evaluation system

    DOE Patents [OSTI]

    Hood, Donald W.; Johnson, John A.; Smartt, Herschel B.

    1987-01-01

    A system for concurrent, non-destructive evaluation of partially completed welds for use in conjunction with an automated welder. The system utilizes real time, automated ultrasonic inspection of a welding operation as the welds are being made by providing a transducer which follows a short distance behind the welding head. Reflected ultrasonic signals are analyzed utilizing computer based digital pattern recognition techniques to discriminate between good and flawed welds on a pass by pass basis. The system also distinguishes between types of weld flaws.